Ricoh Aficio MP C3000 Security Guide - Page 51

Windows Authentication

Page 51 highlights

Authentication and its Application Windows Authentication Specify this authentication when using the Windows domain controller to au- thenticate users who have their accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the directory server. Under Windows authentication, you can specify the access limit for each group regis- 2 tered in the directory server. The address book stored in the directory server can be registered to the machine, enabling user authentication without first using the machine to register individual settings in the address book. If you can obtain user information, the sender's address (From:) is fixed to prevent unauthorized access when sending e-mails under the scanner function. Important ❒ During Windows Authentication, data registered in the directory server, such as the user's e-mail address, is automatically registered in the machine. If user information on the server is changed, information registered in the machine may be overwritten when authentication is performed. ❖ Operational Requirements for Windows Authentication • To specify Windows authentication, the following requirements must be met: • The Printer/Scanner unit must be installed. • A domain controller has been set up in a designated domain. • This function is supported by the operating systems listed below. NTLM authentication is used for Windows authentication. To obtain user information when running Active Directory, use LDAP. If SSL is being used, this requires a version of Windows that supports TLS v1, SSL v2, or SSL v3. • Windows NT 4.0 Server • Windows 2000 Server • Windows Server 2003 Limitation ❒ Users managed in other domains are subject to user authentication, but they cannot obtain items such as e-mail addresses. ❒ If you have created a new user in the domain controller and selected [User must change password at next logon], log on to the machine from the computer to change the password before logging on from the machine's control panel. Note ❒ The first time you access the machine, you can use the functions available to your group. If you are not registered in a group, you can use the functions available under [Default Group]. To limit which functions are available to which users, first make settings in advance in the address book. ❒ When accessing the machine subsequently, you can use all the functions available to your group and to you as an individual user. ❒ Enter the login password correctly, keeping in mind that it is case-sensitive. 42

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236

Authentication and its Application
42
2
Windows Authentication
Specify this authentication when using the Windows domain controller to au-
thenticate users who have their accounts on the directory server. Users cannot
be authenticated if they do not have their accounts in the directory server. Under
Windows authentication, you can specify the access limit for each group regis-
tered in the directory server. The address book stored in the directory server can
be registered to the machine, enabling user authentication without first using the
machine to register individual settings in the address book. If you can obtain
user information, the sender’s address (From:) is fixed to prevent unauthorized
access when sending e-mails under the scanner function.
Important
During Windows Authentication, data registered in the directory server, such
as the user’s e-mail address, is automatically registered in the machine. If user
information on the server is changed, information registered in the machine
may be overwritten when authentication is performed.
Operational Requirements for Windows Authentication
To specify Windows authentication, the following requirements must be
met:
The Printer/Scanner unit must be installed.
A domain controller has been set up in a designated domain.
This function is supported by the operating systems listed below. NTLM
authentication is used for Windows authentication. To obtain user infor-
mation when running Active Directory, use LDAP. If SSL is being used,
this requires a version of Windows that supports TLS v1, SSL v2, or SSL v3.
Windows NT 4.0 Server
Windows 2000 Server
Windows Server 2003
Limitation
Users managed in other domains are subject to user authentication, but they
cannot obtain items such as e-mail addresses.
If you have created a new user in the domain controller and selected
[
User
must change password at next logon
]
, log on to the machine from the computer
to change the password before logging on from the machine’s control panel.
Note
The first time you access the machine, you can use the functions available to
your group. If you are not registered in a group, you can use the functions
available under
[
Default Group
]
. To limit which functions are available to
which users, first make settings in advance in the address book.
When accessing the machine subsequently, you can use all the functions
available to your group and to you as an individual user.
Enter the login password correctly, keeping in mind that it is case-sensitive.