Konica Minolta bizhub C3350 bizhub C3850/C3350 Applied Functions User Guide - Page 29
[Authentication Device Settings] - [General Settings], [PKI Settings] - [Device Certificate]
View all Konica Minolta bizhub C3350 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 29 highlights
1.5 Available operations in Administrator mode 1 [Authentication Device Settings] - [General Settings] To display: Administrator mode - [Security] - [Authentication Device Settings] - [General Settings] (This menu is displayed when the optional Authentication Unit AU-201 is installed.) Configure the setting relevant to IC card authentication. Item [Authentication Type] Description Select how to log in to this machine. • [Card Authentication]: Allows the user to log in by simply placing the IC card. • [Card Authentication+Password]: Allows the user to log in by placing the IC card and entering the password. [None] is specified by default. Tips If this menu is changed, the card information saved on this machine is deleted. [PKI Settings] - [Device Certificate] To display: Administrator mode - [Security] - [PKI Settings] - [Device Certificate] You can self-create a new certificate of this machine or install a certificate issued by the Certificate Authority (CA). For details, refer to page 2-34. [PKI Settings] - [SSL/TLS Settings] To display: Administrator mode - [Security] - [PKI Settings] - [SSL/TLS Settings] Select whether or not to enable SSL communication. Also select the SSL encryption strength. Item [SSL/TLS] [Encryption Strength] [SSL/TLS Version] Description Select whether or not to enable SSL communication. [Disable] is specified by default. Select the SSL encryption strength. Select the appropriate strength to suit your environment. [AES-256, 3DES, RC4-128] is specified by default. Select the version of the SSL to be used. Select the appropriate version to suit your environment. [PKI Settings] - [Protocol Settings] To display: Administrator mode - [Security] - [PKI Settings] - [Protocol Settings] This machine can manage multiple certificates and use different certificates depending on the application (protocol). Select a certificate that is used for the protocol. To use [IEEE802.1X] Item [Protocol] Description [IEEE802.1X] [Applied Functions] 1-23