Konica Minolta bizhub C654 bizhub C654/C754 Web Management Tool User Guide - Page 187

Restricting Users from Using this Device, 12.1 Overview of User Authentication and Account Track

Page 187 highlights

12.1 Overview of User Authentication and Account Track 12 12 Restricting Users from Using this Device 12.1 Overview of User Authentication and Account Track User Authentication Employing User Authentication enables you to manage users who can use this machine. It also enables security- and cost-conscious advanced operations of this machine. By employing User Authentication, you can use the following functions to users of this machine. Functions Identification Allow Accounting Description This function allows you to restrict users of this machine by identifying them. You can set privileges to use the functions of this machine by user. • For example, you can set so that specific users can use the color print- ing function, but other users can use only the black and white printing function. Also, you can set it up so that users unidentified by this machine (public users) are not allowed to print data. • You can also limit access to destinations for each user. Based on the degree of importance of the address and relation with users, you can set it up so that specific users can access all destinations but other users can access only a part of destinations. Configuring settings according to the business requirements of users provides you with security measures and cost reductions simultaneously. You can record the use status of this machine by user. Analyzing it by user enables efficient operation of this machine. For example, depending on the use status of this machine, you can manage the maximum number of sheets each user can print. This encourages users to develop awareness of costs, contributing to cost reduction. The user authentication methods are classified into three types: MFP authentication, external server authentication, and MFP authentication + External Server Authentication. Authentication Method MFP authentication Description The method to manage users of this machine using the authentication function of this machine. Since user information is managed inside this machine, you can use it only by registering it. For details, refer to page 12-5. bizhub C754/C654 12-2

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427

bizhub C754/C654
12-2
12.1
Overview of User Authentication and Account Track
12
12
Restricting Users from Using this Device
12.1
Overview of User Authentication and Account Track
User Authentication
Employing User Authentication enables you to manage users who can use this machine. It also enables se-
curity- and cost-conscious advanced operations of this machine. By employing User Authentication, you can
use the following functions to users of this machine.
The user authentication methods are classified into three types: MFP authentication, external server authen-
tication, and MFP authentication + External Server Authentication.
Functions
Description
Identification
This function allows you to restrict users of this machine by identifying
them.
Allow
You can set privileges to use the functions of this machine by user.
For example, you can set so that specific users can use the color print-
ing function, but other users can use only the black and white printing
function. Also, you can set it up so that users unidentified by this ma-
chine (public users) are not allowed to print data.
You can also limit access to destinations for each user. Based on the
degree of importance of the address and relation with users, you can
set it up so that specific users can access all destinations but other us-
ers can access only a part of destinations.
Configuring settings according to the business requirements of users pro-
vides you with security measures and cost reductions simultaneously.
Accounting
You can record the use status of this machine by user.
Analyzing it by user enables efficient operation of this machine.
For example, depending on the use status of this machine, you can man-
age the maximum number of sheets each user can print. This encourages
users to develop awareness of costs, contributing to cost reduction.
Authentication Method
Description
MFP authentication
The method to manage users of this machine using the authentication
function of this machine.
Since user information is managed inside this machine, you can use it only
by registering it.
For details, refer to page 12-5.