Solution Design Guide
Solution Design Guide
Solution Design Guide
D10909-11
October 2013
Trademarks: Nuance, the Nuance logo, SafeCom, SafeCom Go, SafeCom P:Go,
SafeCom ePay and the SafeCom logo are trademarks of Nuance
Communications, Inc. or its affiliates in the United States and/or other
countries. All other trademarks referred to herein are the property of their
respective owners. Nuance Communications, Inc. cannot be held responsible for
any technical or typographical errors and reserves the right to make changes to
products and documentation without prior notification.
Third Party Software: This software may contain third party software which
requires notices and/or additional terms and conditions. Such required third
party software notices and/or additional terms and conditions are located in
the SafeCom Third Party Notice document.
Patent: Nuance Communications, Inc. has received the following British patent
GB 2350 713 B, US patent US 6,952,780 B2 and Europe EUR EP1 120 701.
D10909-11 2
Table of contents
1 Introduction ............................................................................................5
1.1 Audience ..................................................................................... 5
1.2 Additional documentation ................................................................ 5
1.3 About this manual.......................................................................... 5
1.4 Document history .......................................................................... 6
5 Security ............................................................................................... 34
5.1 Network and firewall .................................................................... 34
5.2 Encryption ................................................................................. 34
D10909-11 3
5.2.1 Prerequisites .............................................................. 34
5.2.2 RSA versus AES ............................................................ 34
5.2.3 Encryption of security sensitive fields ................................ 35
5.2.4 Device license and user encryption settings......................... 35
D10909-11 4
1 Introduction
1 Introduction
1.1 Audience
This manual is intended for IT professionals involved in designing SafeCom
Smart Printing solutions. The manual supposes that the reader is a certified
SafeCom professional.
D10909-11 5
1 Introduction
Revision D10909-10
Revision D10909-09
Revision D10909-08
Revision D10909-07
Revision D10909-06
Revision D10909-05
Revision D10909-04
D10909-11 6
2 Solution Architecture
2 Solution Architecture
In this chapter you will learn to determine which customers can manage with a
SafeCom Single Server installation and which customers need a SafeCom
Multiserver installation.
A small size organization with 200 employees has realized that money can be
saved if they consolidate their dispersed mixed printer fleet to 10 new MFPs
and enforce print policies among the employees. The organization is a typical
organization where the majority of print jobs come from MS Office. This tells
you that the load on the SafeCom server is limited, which means that a
SafeCom single server solution will be enough.
Even with significantly more devices and users a single server solution can
be sufficient:
D10909-11 7
2 Solution Architecture
If you have a ‘users per device’ ratio of for example 15, then you can use this
to convert number of users into number of devices (4500 users=300 devices).
D10909-11 8
2 Solution Architecture
8 M pages per month per server 3 M pages per month per server
800 devices per server 300 Pull print devices per server
Sizing 64-bit:
The sizing information is only a rule of thumb and assumes use of contemporary
(anno 2012) computer hardware. Several factors influence the sizing, such as
CPU, I/O, RAM, network bandwidth, and user concurrency (how many users are
printing at the same time). On 32-bit systems the number of concurrent
connections is likely to be the limiting factor (2.2.3).
D10909-11 9
2 Solution Architecture
Connections used by
SafeCom server
Per Extra per Extra per
SafeCom components connected concurrent concurrent
component user login print job
SafeCom Slave Server 6 0 0
SafeCom Print Server1 6 0 1
SafeCom Print Client2 3 0 1
SafeCom-enabled MFP or printer 0 1 1
3
SafeCom Device Server 1 1 1
SafeCom Web Interface 3 1 0
In general one should apply the same measures taken to ensure availability of
Windows print servers and Windows domain controllers. Typical technologies
that can be applied to reduce risk of failure are:
Failover (2.3.1)
Clustering (2.3.2)
Disaster Recovery (2.3.3)
1
SafeCom Print Server. A computer with SafeCom Pull and/or SafeCom Push printers.
2
SafeCom Print Client. It is assumed that the SafeCom Pull Port is referencing localhost
(SafeCom Print Client) and not a SafeCom Server.
3
SafeCom Device Server uses multiplexing and will open one physical connection for
every 50 devices.
D10909-11 10
2 Solution Architecture
2.3.1 Failover
High level of availability can be achieved by specifying a prioritized list of
servers that users should be moved to in the event that their home server
becomes unavailable. Users with special rights are not moved as they always
have the SafeCom master server as their home server. It is a prerequisite that
the SafeCom master server and the SQL master server are available.
During failover, the user’s home server maintains a list of the user’s pending
print jobs, but the print jobs remain at their location. The user’s home server
will automatically be reset to the original home server when it becomes
available again. To avoid excess network load pending documents are not
moved when the user’s home server changes which means that users have to
submit their documents for printing again.
2.3.2 Clustering
The SafeCom server and the SafeCom printers on Windows 2008 and 2003 are
cluster-aware (requires a SafeCom Cluster Server license), and the SafeCom
server supports Active-Passive server.
If a node in a failover cluster stops working another one takes over. This gives
unprecedented high availability. Refer to microsoft.com for additional
information on hardware and software requirements.
D10909-11 11
2 Solution Architecture
Considering limited bandwidth issues, storing print jobs locally with SafeCom
Print Client can reduce up to 50% of the print related traffic as documents
travel on the network only once, and thereby influence the number of
necessary SafeCom Servers and print servers.
D10909-11 12
2 Solution Architecture
DB DB
SafeCom
Print Client
Print data
Print data
The following table lists the things you need to consider when deciding on
storing documents locally with the SafeCom Print Client or on the SafeCom
Server:
D10909-11 13
2 Solution Architecture
Job submission:
Control data from the computer to the server (print data stored locally at
computer):
3 KB.
Keep alive:
Control data between device and server (every 60 seconds)
D10909-11 14
2 Solution Architecture
By keeping print jobs within the branch network and on users’ computers until
users log in at the device, bandwidth load is reduced.
Corporate Network
SQL
DB DB DB
Branch network
SafeCom SafeCom-enabled
Print Client printer / MFP
Print data
D10909-11 15
3 SafeCom Servers
3 SafeCom Servers
This chapter describes the SafeCom multiserver concepts and the SafeCom
master server (3.3), SQL master server (3.4), SafeCom slave server (3.5),
SafeCom home server (3.6) and Print server (3.7).
D10909-11 16
3 SafeCom Servers
Print server: It hosts the shared SafeCom Pull Printers and SafeCom Push
Printers.
Document storage: For Pull Print the users’ documents are stored and
encrypted on the slave server. With SafeCom G4 the documents can
instead be stored on users’ computers.
D10909-11 17
3 SafeCom Servers
Tracking data (local). Whenever the user performs a job (print, copy or
scan) a tracking record is created. Tracking data is subsequently collected
on a scheduled basis by the SafeCom master server and thereafter
deleted from the home server.
Document list. For Pull Print the list of the user’s documents is
maintained on the home server. Whenever the user submits or collects a
Pull Print document the list of documents is updated. The list contains
references to where the documents are stored.
Document storage. For Pull Print the user’s documents are stored
encrypted on the SafeCom Server that the Pull Print queue points to.
With SafeCom Print Client the documents can instead be stored on users’
computers or on a print server.
D10909-11 18
3 SafeCom Servers
SafeCom Go for these devices will run on the SafeCom Device Server and no
SafeCom software needs to be installed on the devices. However, the computer
hosting the SafeCom Device Server must be running to allow users to use the
devices.
The user interface data flows between the device and the SafeCom Device
Server in connection with login, printing, logout, refreshing, status update
messages, etc. Latency is obviously a critical factor in any user interface
interaction and it may therefore become necessary to have the SafeCom Device
Server software run on a local computer within the local network instead of on
a server on the corporate network.
3.9 Virtualization
The SafeCom products can successfully be deployed and run in a virtual
environment such as Microsoft Virtual Server and VMware as long as it supports
the operating system.
The underlying physical computer hardware and storage area network (SAN)
can be distributed across two or more data centers provided there is a fast and
resilient network connection (fiber) between the centers.
D10909-11 19
3 SafeCom Servers
The VMware with vmotion is a very powerful platform ensuring full redundancy
on the entire server level. However, the current public release of VMware
server cannot control each service as it is possible with Microsoft Cluster. When
using MS Cluster and a service fails within a defined threshold the server is
moved to another node for continues operation.
If a SafeCom server is down, users who have the SafeCom server as their
home server (3.6) cannot log in. However, push printers that are
configured to allow printing at all times, can still be used on the servers
running.
D10909-11 20
4 SafeCom Databases
4 SafeCom Databases
A SafeCom server depends on the availability of its database. In most cases the
provided SQL Server 2008 R2 Express database can be used. In a solution with
multiple SafeCom servers the master SQL server must run Microsoft SQL Server
2012, 2008 or 2005.
When Offline tracking is enabled which by default it is, the tracking database
on the SafeCom slave is automatically emptied every time the SafeCom master
server has collected the tracking data.
However, the tracking database on the SQL master server is not emptied and
will continue to grow. It is therefore recommended to establish a procedure for
exporting and deleting old tracking data to keep the database size within the
defined limits.
Tracking data can be exported and deleted directly using SQL tools.
Alternatively the SafeCom Administrator API’s ExportTracking or DeleteTracking
commands can be used.
In Pay solutions both the tracking and the money database (4.3) will continue
to grow. Even though a money database exists on each server only the money
database on the SQL master server is used. This is because there must only be
one single point to store and maintain users’ credits. The housekeeping process
should handle the table: scTransaction.
The SafeCom event database automatically deletes events that are more than
one year old.
D10909-11 21
4 SafeCom Databases
The SafeCom solution uses the Microsoft ADSI interface when importing users.
ADSI is a set of extensible, easy-to-use programming interfaces based on
Microsoft's Component Object Model (COM).
D10909-11 22
4 SafeCom Databases
4
scBillingComb was introduced in SafeCom G3 Server version S82 070.410*01
5
scBillingConfig was introduced in SafeCom G3 Server version S82 070.410*01
6
scBOPCInfo was introduced in SafeCom G3 Server version S82 070.410*01
7
scBRanchInfo was introduced in SafeCom G3 Server version S82 070.410*01
8
scCardInfo was introduced in SafeCom G2 Server version S82 070.380*02
9
scClientConfig was introduced in SafeCom G3 Server version S82 070.420*01
10
scDelegates was introduced in SafeCom G3 Server version S82 070.440*01
11
scDeviceServerInfo was introduced in SafeCom G3 Server version S82 070.420*01
12
scScheduleInfo was introduced in SafeCom G2 Server version S82 070.380*03
D10909-11 23
4 SafeCom Databases
scTreeView R
scUserInfo R
scUserInfoLocal
Tables in scevent
scDatabaseInfo
scEventLog
Tables in scpurse
scDatabaseInfo
scPayTicket
scTransaction
scTransactionCount
Tables in sctracking
scAggSavings
scBillingTracking
scMoneyLoaderTracking
scResourceTransform
scSanityTracking
scTracking
scTrackingCounters
scTrackingExport
D10909-11 24
4 SafeCom Databases
user authentication
sccore
print job info scJobServer
database
print job storage
scpurse
user credit accounting scMoneyServer
database
credit
data access
scevent
event and audit logging scEventLog
database
event log
data access
D10909-11 25
4 SafeCom Databases
The SafeCom slave servers can use the free Microsoft SQL Server 2008 R2
Express; it is not required to run a licensed Microsoft SQL Server.
Note: It is very IMPORTANT that SQL replication is working at all times and is
not set to expire. It is highly recommended to use the SQL 2012, 2008 and 2005
alerting capabilities to notify you when/if the replication stops.
The SafeCom event log will also log these two events:
D10909-11 26
4 SafeCom Databases
The SafeCom slave servers can use the free Microsoft SQL Server 2008 R2
Express; it is not required to run a licensed Microsoft SQL Server.
Note: It is very IMPORTANT that SQL replication is working at all times and is
not set to expire. It is highly recommended to use the SQL 2012, 2008 and 2005
alerting capabilities to notify you when/if the replication stops.
Note: If you are using SQL replication when adding a slave server, ensure that
you use the sp_changedistributor_password stored procedure, or the
Distributor Properties or Update Replication Passwords dialog boxes in SQL
Server Management Studio, as password changes are then applied to local
publications automatically. For more information, see here (for SQL Server
2012) or here (for SQL Server 2000).
D10909-11 27
4 SafeCom Databases
The SafeCom software automatically gives the SQL safecom user a password
that is based on the SafeCom server name. The password complies with
Windows password complexity policies. Clear Enforce password policy as
forgetting to do this will prevent the solution from working when the password
is up for renewal.
The SafeCom Service will automatically create the SafeCom databases in the
Microsoft SQL Server the next time the SafeCom Service is restarted.
Update software
The SQL safecom user must have sysadmin rights to be able to complete
the update in case new databases and/or tables need to be created.
Note: Though it is possible to limit the rights for the SQL safecom user for
day-to-day operation, we do not recommend reducing the rights of the SQL
safecom user to less than sysadmin rights.
D10909-11 28
4 SafeCom Databases
D10909-11 29
4 SafeCom Databases
The following table summarizes the authentication level necessary for common
replication maintenance tasks:
D10909-11 30
4 SafeCom Databases
D10909-11 31
4 SafeCom Databases
D10909-11 32
4 SafeCom Databases
DB DB DB
D10909-11 33
5 Security
5 Security
5.1 Network and firewall
Network communication requires that no firewall is blocking the used TCP and
UDP ports. Refer to the Administrator’s Manual for the SafeCom product in
question.
5.2 Encryption
With SafeCom Encryption documents can be encrypted on the network; from
the moment the user clicks print on their computer and until the document is
collected at the device. This prevents anyone from reading the documents,
should they be intercepted on the network. Documents are always encrypted
when traveling from the SafeCom Pull Port to the SafeCom server and when
they are stored for later printing.
5.2.1 Prerequisites
Encryption is included in the SafeCom license key code.
The user has encryption enabled, that is, Encrypt documents is checked
on the Settings tab in the User properties dialog (in SafeCom
Administrator).
The device has encryption enabled, that is, Encryption is checked on the
License tab in the Device properties dialog (in SafeCom Administrator).
A local SafeCom Pull Printer is installed on the computer of the user
requiring encryption.
The device is connected to the SafeCom Controller’s 2-port switch. On
devices with an internal SafeCom Go solution decryption is done inside
the device.
The SafeCom G4 server uses RSA (512-bit) and TwoFish (128-bit) encryption
between the various components in the SafeCom solution and when storing
documents.
D10909-11 34
5 Security
RSA is a very slow encryption algorithm, but with RSA you can publish a public
key and therefore send the symmetric key encrypted with the public key. The
recipient can then decrypt it with his private key.
The AES and TwoFish algorithm are faster than RSA and are used to
encrypt/decrypt the bulk data more efficiently, even on limited hardware
processors like printers or SafeCom Controllers.
No encryption of Encryption of
Device \ User
user’s documents user’s documents
No encryption by
No encryption No encryption
device
D10909-11 35
5 Security
Secure Connection
Job Server
Priv_2
Secure Connection
Pub_2
Exchange Key
Connect
Tracking Server
Connect
SafeCom Spool Priv_3
Exchange Key Pub_3
SafeCom Go
Secure Connection Decryption
Printed Output
SafeCom G4 encryption
D10909-11 36
6 User accounts
6 User accounts
6.1 Built-in user accounts
The SafeCom solution features two built-in user accounts:
ADMIN
Administrator account with the default password nimda.
TECH
Technician account with the default password hcet, initial PUK code
12345678 and default PIN code 1234.
Once the SafeCom G4 server has been installed and successfully tested it is
recommended to:
Create a new user with Administrator rights and if necessary a user with
Technician rights.
Change the default password (nimda) for the built-in user account ADMIN.
Change the default password (hcet) for the built-in user account TECH.
Check that the initial PUK code 12345678 is no longer present.
6.2 Administrator
Only users with administrator rights in the SafeCom Smart Printing solution can
access SafeCom Administrator. The users must supply their SafeCom password
to log in to SafeCom Administrator.
6.3 Technician
A user with Technician rights can:
D10909-11 37
7 Frequently asked questions
If the user logon on Windows differs from the one on the other system, then
the user logon on the other system can be added as an alias for the user.
SafeCom Reports builds on Crystal Reports from SAP (acquired from Business
Objects in 2007). SafeCom Reports includes a number of predefined, but
parameterized reports. SafeCom can develop and supply additional reports
according to specification.
D10909-11 38
8 Appendix A: Questions on service availability
No Question Ref.
Q1 If a user cannot use the MFP/printer he is normally using (8.1)
would it be ok for the user to use another MFP/printer during
the device downtime?
Q3 If a user needs to copy and scan at an MFP, but cannot log in (8.3)
at the MFP, would it be ok if the access control for these
functions would be disabled during the server downtime?
The SafeCom-enabled device can reference multiple SafeCom servers and if the
first SafeCom server on the list is unavailable the device will try the next one.
D10909-11 39
8 Appendix A: Questions on service availability
Both the SafeCom Pull Port and SafeCom Push Port can reference multiple
SafeCom servers and if the first SafeCom server on the list is unavailable it will
try the next one. This feature can be used to give extra availability when the
ports are installed on Print servers (2.4.4) or clients.
D10909-11 40
9 Appendix B: Support services
D10909-11 41