iii
TABLE OF CONTENTS
Manuals for This Machine
......................................................................................
i
How to Read This Manual
.....................................................................................
1
Symbols
.....................................................................................................................
1
1. Getting Started
Enhanced Security
.................................................................................................
3
Glossary
.....................................................................................................................
4
Setting Up the Machine
..............................................................................................
5
Security Measures Provided by this Machine
.....................................................
7
Using Authentication and Managing Users
................................................................
7
Preventing Information Leaks
....................................................................................
7
Limiting and Controlling Access
.................................................................................
9
Enhanced Network Security
.....................................................................................
10
2. Authentication and its Application
Administrators and Users
...................................................................................
11
Administrators
..........................................................................................................
11
User
..........................................................................................................................
12
The Management Function
.................................................................................
13
About Administrator Authentication
..........................................................................
14
About User Authentication
.......................................................................................
15
Enabling Authentication
......................................................................................
16
Authentication Setting Procedure
.............................................................................
16
Administrator Authentication
.............................................................................
17
Specifying Administrator Privileges
..........................................................................
17
Registering the Administrator
...................................................................................
20
Logging on Using Administrator Authentication
.......................................................
23
Logging off Using Administrator Authentication
.......................................................
26
Changing the Administrator
......................................................................................
27
User Authentication
.............................................................................................
29
User Code Authentication
........................................................................................
29
Basic Authentication
.................................................................................................
33
Windows Authentication
...........................................................................................
42
LDAP Authentication
................................................................................................
50
Integration Server Authentication
.............................................................................
57
If User Authentication is Specified
.....................................................................
66
User Code Authentication (Using the Control Panel)
...............................................
66
User Code Authentication (Using a Printer Driver)
..................................................
66
Login (Using the Control Panel)
...............................................................................
67
Log Off (Using the Control Panel)
............................................................................
68
Login (Using a Printer Driver)
...................................................................................
69
Login (Using Web Image Monitor)
...........................................................................
69
Log Off (Using Web Image Monitor)
........................................................................
69
Auto Logout
..............................................................................................................
70
Authentication using an external device
...................................................................
71