[Applied Functions]
Contents-4
2.8
Searching for a destination using the LDAP server
...................................................................
2-23
Overview
...........................................................................................................................................
2-23
Configuring basic settings for the LDAP search
...............................................................................
2-23
Using SSL communication
...............................................................................................................
2-25
2.9
Registering a destination
.............................................................................................................
2-26
2.9.1
Registering an address book
............................................................................................................
2-26
Registering E-mail addresses
...........................................................................................................
2-26
Registering an FTP destination
.........................................................................................................
2-26
Registering an SMB destination
.......................................................................................................
2-27
Registering a WebDAV destination
...................................................................................................
2-28
Registering a fax destination
............................................................................................................
2-29
Registering an Internet fax address
..................................................................................................
2-30
2.9.2
Registering a group
...........................................................................................................................
2-30
2.9.3
Registering a program
......................................................................................................................
2-31
2.10
Employing MFP authentication
....................................................................................................
2-33
Overview
...........................................................................................................................................
2-33
Configuring basic settings for the user authentication
.....................................................................
2-33
2.11
Employing Active Directory authentication
................................................................................
2-35
Overview
...........................................................................................................................................
2-35
Configuring basic settings for the Active Directory authentication
...................................................
2-35
2.12
Employing account track
.............................................................................................................
2-36
Overview
...........................................................................................................................................
2-36
Configuring basic account track settings
.........................................................................................
2-36
2.13
Using the certificate of this machine
..........................................................................................
2-37
2.13.1
Creating a certificate for this machine to communicate via SSL
......................................................
2-37
Overview
...........................................................................................................................................
2-37
Self-creating a certificate
..................................................................................................................
2-37
Requesting CA for a certificate issuance
..........................................................................................
2-38
2.13.2
Managing the certificates for this machine
.......................................................................................
2-38
Exporting a certificate
.......................................................................................................................
2-38
Importing a certificate
.......................................................................................................................
2-38
Deleting a certificate
.........................................................................................................................
2-39
2.14
Limiting access to destinations for each user
...........................................................................
2-40
2.14.1
Methods to limit access to destinations
...........................................................................................
2-40
2.14.2
Managing destinations at the reference allowed level
......................................................................
2-40
Reference allowed level
....................................................................................................................
2-40
Specifying the reference allowed level
.............................................................................................
2-40
2.14.3
Management based on the reference allowed group
.......................................................................
2-41
Reference Allowed Group
.................................................................................................................
2-41
Assigning a reference allowed group
................................................................................................
2-41
2.14.4
Managing destinations in a combination comprising the reference allowed level with the
reference allowed group
...................................................................................................................
2-42
Combining the reference allowed level with the reference allowed group
.......................................
2-42
Specifying the reference allowed level and the reference allowed group simultaneously
...............
2-43
2.15
Associating a mobile terminal with this machine using the QR code
......................................
2-44
3
Manually Installing the Printer Driver (for Windows)
3.1
Checking the connection method
.................................................................................................
3-2
In Windows Vista/7/8/8.1/Server 2008/Server 2008 R2/Server 2012/Server 2012 R2
.......................
3-2
In Windows Server 2003
.....................................................................................................................
3-3
3.2
Using LPR/Port9100 connection for installation
..........................................................................
3-4
Operations required to use this function (for administrators)
.............................................................
3-4
3.2.1
Installing the printer driver by automatically detecting the printer
......................................................
3-4
In Windows 8/8.1/Server 2012/Server 2012 R2
..................................................................................
3-4
In Windows Vista/7/Server 2008/Server 2008 R2
...............................................................................
3-6
3.2.2
Installing the printer driver by creating a new port
.............................................................................
3-7
In Windows 8/8.1/Server 2012/Server 2012 R2
..................................................................................
3-7
In Windows Vista/7/Server 2008/Server 2008 R2
...............................................................................
3-9
In Windows Server 2003
...................................................................................................................
3-10