bizhub C754/C654
Contents-5
Overview
........................................................................................................................................
12-18
Configurig basic settings for the NTLM authentication
.................................................................
12-19
Using the WINS server
...................................................................................................................
12-22
Using the direct hosting SMB service
............................................................................................
12-23
12.6
Employing the LDAP authentication
.........................................................................................
12-24
Overview
........................................................................................................................................
12-24
Configuring basic settings for the LDAP authentication
................................................................
12-25
Using SSL communication
............................................................................................................
12-28
12.7
Installing the NDS over IPX authentication
..............................................................................
12-29
Overview
........................................................................................................................................
12-29
Configure basic settings for the NDS over IPX authentication
......................................................
12-30
12.8
Employing the NDS over TCP/IP authentication
......................................................................
12-34
Overview
........................................................................................................................................
12-34
Configuring basic settings for the NDS over TCP/IP authentication
.............................................
12-35
12.9
Sending to your address (Scan to Me)
......................................................................................
12-38
12.10
Constructing a single sign-on environment for the SMB transmission
.................................
12-39
12.11
Setting privileges to use the functions of this machine by user or account
.........................
12-40
12.11.1
Restricting available functions by user or account
........................................................................
12-40
12.11.2
Specifying the default function permission setting when the external
server authentication is used
12-41
12.11.3
Restricting functions available to public users
..............................................................................
12-42
12.12
Managing the maximum number of copies by user or account
.............................................
12-43
12.13
Limiting the access to destinations for each user
...................................................................
12-44
12.13.1
Methods to limit access to destinations
........................................................................................
12-44
12.13.2
Managing based on the access allowed level
...............................................................................
12-44
Access Allowed Level
....................................................................................................................
12-44
Setting the access allowed level
....................................................................................................
12-45
12.13.3
Managing based on the reference allowed group
.........................................................................
12-47
Reference Allowed Group
..............................................................................................................
12-47
Assigning a reference allowed group
.............................................................................................
12-47
12.13.4
Combining the access allowed level with the reference allowed group for management
.............
12-49
Combining the access allowed level with the reference allowed group
........................................
12-49
Simultaneously setting an access allowed level and reference allowed group
.............................
12-50
12.14
Changing the function key display pattern by user or account
..............................................
12-53
Overview
........................................................................................................................................
12-53
Allowing changing the function key display pattern by user or account
.......................................
12-53
Selecting a function key display pattern by user
...........................................................................
12-54
Selecting a function key display pattern by account
.....................................................................
12-55
12.15
Specifying the operations of the ID & Print function
...............................................................
12-56
12.16
Configuring common settings when using the authentication function
...............................
12-57
12.17
Restricting print jobs without authentication information
......................................................
12-58
12.18
Printing without a password (Quick Authentication for Printing)
...........................................
12-59
Overview
........................................................................................................................................
12-59
Permitting the Quick Authentication for Printing function
.............................................................
12-59
Registering the quick authentication for printing server
................................................................
12-59
Using SSL communication
............................................................................................................
12-61
12.19
Using the authentication unit
.....................................................................................................
12-63
12.19.1
Setting operations of the authentication unit
.................................................................................
12-63
Authentication Unit (IC card type)
.................................................................................................
12-63
Authentication Unit (biometric type)
...............................................................................................
12-63
12.19.2
Authenticating in the LDAP server using the authentication card
(LDAP-IC Card Authentication)
12-64
Overview
........................................................................................................................................
12-64
Configuring basic settings for the LDAP-IC card authentication
...................................................
12-64
Using SSL communication
............................................................................................................
12-67
12.19.3
Recording the authentication card ID in counter information of this machine
..............................
12-68