Oki B430d-beige smart PrintSuperVision Users Manual - Page 158

Setting Use Restrictions Targeted to the Host Name, Adding from the Job Log, Targeted to the Host Name

Page 158 highlights

9. Restricting Device Use 3 Select [Other URLs] from [Registered Document Name List]. 4 Configure the settings in [Restricted Items List]. For details on restriction items, see "Usage Limitations" (P. 143). Setting Use Restrictions Targeted to the Host Name If required, use restrictions can be set to the host name. Add the settings using one of the following methods. • Adding from the Job Log • Adding Manually Adding from the Job Log Use restrictions can be set to the host names included in an acquired job log. 1 Configure from [Details Screen] > [Manage] > [Device Management Settings] > [Device Settings]. 5 Click [OK]. 2 Select the device to configure from [Device]. 6 Refer to "Adding from the Job Log" (P. 155) steps 11 and 12 to register the device. 3 C lick in [Log/Access Control] to open the settings window. 4 Check [Enable access control.], and set [Panel Access Control] and [User Auth. Method:]. - 158 -

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257

9. Restricting Device Use
- 158 -
3
Select [Other URLs] from [Registered
Document Name List].
4
Configure the settings in [Restricted Items
List].
For details on restriction items, see “Usage
Limitations” (P. 143).
5
Click [OK].
6
Refer to “Adding from the Job Log”
(P. 155) steps
11
and
12
to register the
device.
Setting Use Restrictions
Targeted to the Host Name
If required, use restrictions can be set to
the host name. Add the settings using one
of the following methods.
• Adding from the Job Log
• Adding Manually
Adding from the Job Log
Use restrictions can be set to the host
names included in an acquired job log.
1
Configure from [Details Screen] >
[Manage] > [Device Management
Settings] > [Device Settings].
2
Select the device to configure from
[Device].
3
Click
in [Log/Access Control] to open
the settings window.
4
Check [Enable access control.], and set
[Panel Access Control] and [User Auth.
Method:].