Oki B430d-beige smart PrintSuperVision Users Manual - Page 161

Setting Use Restrictions Targeted to the Application Name, Adding Manually

Page 161 highlights

9. Restricting Device Use 3 Select [OtherHostNames] from [Registered Host Name List]. Adding Manually 1 Configure from [Details Screen] > [Manage] > [Device Management Settings] > [Device Settings]. 4 Configure the settings in [Restricted Items List]. For details on restriction items, see "Usage Limitations" (P. 143). 2 Select the device to configure from [Device]. 5 Click [OK]. 3 C lick in [Log/Access Control] to open the settings window. 6 Refer to "Adding from the Job Log" (P. 158) steps 11 and 12 to register the device. Setting Use Restrictions Targeted to the Application Name If required, use restrictions can be set to the application name. Add the settings using one of the following methods. • Adding manually • Adding from the job log 4 Check [Enable access control.], and set [Panel Access Control] and [User Auth. Method:]. Note • D epending on the device, some items may not be displayed. • D epending on the used application, a space may be included in the application name. When the application name is specified using [Direct Input] and the restrictions are not enabled, select and register the application name that you want to restrict in [Job Log]. - 161 -

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257

9. Restricting Device Use
- 161 -
3
Select [OtherHostNames] from [Registered
Host Name List].
4
Configure the settings in [Restricted Items
List].
For details on restriction items, see “Usage
Limitations” (P. 143).
5
Click [OK].
6
Refer to “Adding from the Job Log”
(P. 158) steps
11
and
12
to register the
device.
Setting Use Restrictions
Targeted to the Application
Name
If required, use restrictions can be set to
the application name. Add the settings
using one of the following methods.
• Adding manually
• Adding from the job log
Adding Manually
1
Configure from [Details Screen] >
[Manage] > [Device Management
Settings] > [Device Settings].
2
Select the device to configure from
[Device].
3
Click
in [Log/Access Control] to open
the settings window.
4
Check [Enable access control.], and set
[Panel Access Control] and [User Auth.
Method:].
Note
Depending on the device, some items
may not be displayed.
Depending on the used application, a
space may be included in the application
name. When the application name is
specified using [Direct Input] and the
restrictions are not enabled, select and
register the application name that you
want to restrict in [Job Log].