Oki B430d-beige smart PrintSuperVision Users Manual - Page 142

Restricting Device Use

Page 142 highlights

9. Restricting Device Use What Can Be Done With Use Restrictions 143 Usage Limitations 143 Setting Use Restrictions for User Names 147 Adding from the User 147 Adding Manually 149 Adding from the Job Log 150 Creating a CSV File to Add in a Batch 150 Importing Users Specified in Windows 151 Adding by Associating a PIN to an Authentication User Name 152 Adding Unregistered User Settings 153 Registering Roles 153 Setting LDAP Authentication 154 Setting Use Restrictions Targeted to the Document Name 155 Adding from the Job Log 155 Adding Manually 157 Adding Unregistered Item Setting 157 Setting Use Restrictions Targeted to the Host Name 158 Adding from the Job Log 158 Adding Manually 160 Adding Unregistered Item Settings 160 Setting Use Restrictions Targeted to the Application Name 161 Adding Manually 161 Adding from the Job Log 162 Adding Unregistered Item Settings 163 Displaying Device Registered Use Restrictions....... 164 Changing Device Registered Use Restrictions........ 164 Delete Device Registered Use Restrictions 166 Deleting Individual Use Restrictions 166 Deleting All Use Restrictions (Restoring Initial Status 167 Temporarily Disabling Use Restrictions 168 Enabling Use Restrictions 168

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257

9.Restricting Device Use
What Can Be Done With Use Restrictions
.............
143
Usage Limitations
.........................................
143
Setting Use Restrictions for User Names
..............
147
Adding from the User
....................................
147
Adding Manually
..........................................
149
Adding from the Job Log
...............................
150
Creating a CSV File to Add in a Batch
..............
150
Importing Users Specified in Windows
.............
151
Adding by Associating a PIN to an Authentication
User Name
..................................................
152
Adding Unregistered User Settings
.................
153
Registering Roles
.........................................
153
Setting LDAP Authentication
..............................
154
Setting Use Restrictions Targeted to the Document
Name
.............................................................
155
Adding from the Job Log
...............................
155
Adding Manually
..........................................
157
Adding Unregistered Item Setting
...................
157
Setting Use Restrictions Targeted to the
Host Name
......................................................
158
Adding from the Job Log
...............................
158
Adding Manually
..........................................
160
Adding Unregistered Item Settings
.................
160
Setting Use Restrictions Targeted to the
Application Name
.............................................
161
Adding Manually
..........................................
161
Adding from the Job Log
...............................
162
Adding Unregistered Item Settings
.................
163
Displaying Device Registered Use Restrictions
......
164
Changing Device Registered Use Restrictions
.......
164
Delete Device Registered Use Restrictions
...........
166
Deleting Individual Use Restrictions
................
166
Deleting All Use Restrictions (Restoring Initial
Status)
.......................................................
167
Temporarily Disabling Use Restrictions
................
168
Enabling Use Restrictions
..............................
168