Konica Minolta bizhub 223 bizhub 223/283/363/423 PKI Security Operations User - Page 50

User Authentication Function

Page 50 highlights

3.1 User Authentication Function 3 3 User Operations 3.1 User Authentication Function To authenticate a user before he or she actually uses the machine, user authentication is performed using the IC card and PIN code. The IC card reader installed in the machine is used to read the IC card. The PIN code entered is displayed as "*" during the authentication procedure. If a document is saved in the PKI Encrypted Document User Box of this machine, the print data of the user in question saved in the PKI Encrypted Document User Box of this machine can be automatically printed after the authentication by means of the IC card on the control panel is successful. Because printing occurs after user authentication is performed via the control panel of this machine, it is suitable for printing highly confidential documents. User authentication using the IC card 0 Contact the Administrator of the machine if the server is not registered. 0 Do not leave the machine while you are in the user operation mode. If it is absolutely necessary to leave the machine, be sure first to log off from the user operation mode. 1 Insert the IC card into the IC card reader connected to the machine. % The following screen appears if any document is saved in the PKI Encrypted Document User Box. After selecting [Print & Access] or [Access], insert the IC card into the IC card reader. Login Method Description [Print & Access] The user operation mode screen is called to the screen after the PKI Encrypted document of the corresponding user is printed. [Access] Only the ordinary login procedure is applicable and no PKI Encrypted document are printed. % If there are two or more PKI Encrypted documents are involved, all of them will be printed. To select and print only a specific document, select [Access] and select the specific document from those in bizhub 423/363/283/223 3-2

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55

bizhub 423/363/283/223
3-2
3.1
User Authentication Function
3
3
User Operations
3.1
User Authentication Function
To authenticate a user before he or she actually uses the machine, user authentication is performed using the
IC card and PIN code. The IC card reader installed in the machine is used to read the IC card. The PIN code
entered is displayed as "*" during the authentication procedure.
If a document is saved in the PKI Encrypted Document User Box of this machine, the print data of the user
in question saved in the PKI Encrypted Document User Box of this machine can be automatically printed after
the authentication by means of the IC card on the control panel is successful. Because printing occurs after
user authentication is performed via the control panel of this machine, it is suitable for printing highly confi-
dential documents.
User authentication using the IC card
0
Contact the Administrator of the machine if the server is not registered.
0
Do not leave the machine while you are in the user operation mode. If it is absolutely necessary to leave
the machine, be sure first to log off from the user operation mode.
1
Insert the IC card into the IC card reader connected to the machine.
%
The following screen appears if any document is saved in the PKI Encrypted Document User Box.
After selecting [Print & Access] or [Access], insert the IC card into the IC card reader.
%
If there are two or more PKI Encrypted documents are involved, all of them will be printed. To select
and print only a specific document, select [Access] and select the specific document from those in
Login Method
Description
[Print & Access]
The user operation mode screen is called to the screen after the PKI
Encrypted document of the corresponding user is printed.
[Access]
Only the ordinary login procedure is applicable and no PKI Encrypt-
ed document are printed.