WSC - Guests database - Configure the Guests database

Principle

In Watchdoc, Guest management allows you to manage a database in which Guests, users who are not registered in the Watchdoc directory, are recorded. To obtain precise information about users in the Watchdoc print history, you need to configure the confidentiality settings on the print device.

Access the device configuration interface as an administrator.

  1. From the WSC Main Menu, click on the Configuration menu item:

  1. In the Advanced Configuration interface, click on the Guest Base button;



    è This takes you to the Guest database configuration interface.

Configure the guests database

Connection information section

  1. In this section, enter the information needed to establish the connection with the database in which the guest accounts are stored:

    • Type: select the type of database used to register guest accounts from the list;

    • SQL server: In this field, specify the server on which the database used to register guest accounts is located. If you don't know the name of the server, click on the button to browse the list of existing servers and select the server used.

    • Authentication: select the type of authentication required to access SQL Server (SQL Server or Windows SSPI).

    • User name: if you have opted for SQL authentication, enter in this field the user name authorised to access the database used; if you have opted for SSPI authentication, this information will be communicated automatically.

    • Password: if you have opted for SQL authentication, enter in this field the password associated with the user authorised to access the database; if you have opted for SSPI authentication, this information will be communicated automatically.

    • Database: in the field, enter the name of the database used to register guest accounts.

    • Path: if the database is SQLite, enter the path to the database :

       



  2. Once all the fields have been completed, click on the Connection test button to check that the information to check that the information provided allows access to the database used to register guest accounts.

Code PUK code section

In this section, specify the level of algorithm to be used to generate the PUK code used by guest users to identify themselves:

  • either a 6-digit algorithm (low security) ;

  • or a 10-digit algorithm (medium security).

 

èOnce the Guests database has been set up, you can add guest accounts to it.