Oki B420dn-Black smart PrintSuperVision Users Manual - Page 6

Restricting Device Use, Managing Available Usage

Page 6 highlights

Active Directory-linked Management 138 Adding Users/User Groups 138 Changing User Information 139 Changing Attributes Displayed in the User List 141 Deleting Users/User Groups 141 9. Restricting Device Use 143 What Can Be Done With Use Restrictions 143 Usage Limitations...143 Setting Use Restrictions for User Names 147 Adding from the User 147 Adding Manually...149 Adding from the Job Log 150 Creating a CSV File to Add in a Batch 150 Importing Users Specified in Windows 151 Adding by Associating a PIN to an Authentication User Name 152 Adding Unregistered User Settings 153 Registering Roles...153 Setting LDAP Authentication 154 Setting Use Restrictions Targeted to the Document Name 155 Adding from the Job Log 155 Adding Manually...157 Adding Unregistered Item Setting 157 Setting Use Restrictions Targeted to the Host Name 158 Adding from the Job Log 158 Adding Manually...160 Adding Unregistered Item Settings 160 Setting Use Restrictions Targeted to the Application Name 161 Adding Manually...161 Adding from the Job Log 162 Adding Unregistered Item Settings 163 Displaying Device Registered Use Restrictions 164 Changing Device Registered Use Restrictions 164 Delete Device Registered Use Restrictions 166 Deleting Individual Use Restrictions 166 Deleting All Use Restrictions (Restoring Initial Status 167 Temporarily Disabling Use Restrictions 168 Enabling Use Restrictions 168 10. Managing Available Usage 170 What can be done with available usage 170 Setting the Available Usage 170 Changing the Priority Level of User Group 171 Creating Fee Charge Definitions 172 Setting Fee Definitions for Devices 176 Changing Fee Charge Definitions 177 - 6 -

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257

- 6 -
Active Directory-linked Management
.............................................................
138
Adding Users/User Groups
.........................................................................................
138
Changing User Information
........................................................................................
139
Changing Attributes Displayed in the User List
.............................................................
141
Deleting Users/User Groups
.......................................................................................
141
9. Restricting Device Use
.......................................................
143
What Can Be Done With Use Restrictions
......................................................
143
Usage Limitations
.....................................................................................................
143
Setting Use Restrictions for User Names
........................................................
147
Adding from the User
................................................................................................
147
Adding Manually
......................................................................................................
149
Adding from the Job Log
...........................................................................................
150
Creating a CSV File to Add in a Batch
..........................................................................
150
Importing Users Specified in Windows
.........................................................................
151
Adding by Associating a PIN to an Authentication User Name
.........................................
152
Adding Unregistered User Settings
.............................................................................
153
Registering Roles
.....................................................................................................
153
Setting LDAP Authentication
........................................................................
154
Setting Use Restrictions Targeted to the Document Name
................................
155
Adding from the Job Log
...........................................................................................
155
Adding Manually
......................................................................................................
157
Adding Unregistered Item Setting
...............................................................................
157
Setting Use Restrictions Targeted to the Host Name
........................................
158
Adding from the Job Log
...........................................................................................
158
Adding Manually
......................................................................................................
160
Adding Unregistered Item Settings
.............................................................................
160
Setting Use Restrictions Targeted to the Application Name
...............................
161
Adding Manually
......................................................................................................
161
Adding from the Job Log
...........................................................................................
162
Adding Unregistered Item Settings
.............................................................................
163
Displaying Device Registered Use Restrictions
................................................
164
Changing Device Registered Use Restrictions
.................................................
164
Delete Device Registered Use Restrictions
.....................................................
166
Deleting Individual Use Restrictions
............................................................................
166
Deleting All Use Restrictions (Restoring Initial Status)
...................................................
167
Temporarily Disabling Use Restrictions
..........................................................
168
Enabling Use Restrictions
..........................................................................................
168
10. Managing Available Usage
................................................
170
What can be done with available usage
.........................................................
170
Setting the Available Usage
.........................................................................
170
Changing the Priority Level of User Group
....................................................................
171
Creating Fee Charge Definitions
...................................................................
172
Setting Fee Definitions for Devices
...............................................................
176
Changing Fee Charge Definitions
..................................................................
177