Ricoh Aficio MP C3000 Security Guide - Page 20
Authentication and its, Application
View all Ricoh Aficio MP C3000 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 20 highlights
2. Authentication and its Application Administrators and Users When controlling access using the authentication specified by an administrator, select the machine's administrator, enable the authentication function, and then use the machine. The administrators manage access to the allocated functions, and users can use only the functions they are permitted to access. To enable the authentication function, the login user name and login password are required in order to use the machine. Specify administrator authentication, and then specifying user authentication. Important ❒ If user authentication is not possible because of a problem with the hard disk or network, you can use the machine by accessing it using administrator authentication and disabling user authentication. Do this if, for instance, you need to use the machine urgently. Reference For details, see p.37 "Specifying Login User Name and Login Password". Administrators There are four types of administrator: machine administrator, network administrator, file administrator, and user administrator. By sharing the administrative work among different administrators, you can spread the workload and limit unauthorized operation by a single administrator. You can also specify a supervisor who can change each administrator's password. Administrators are limited to managing the machine's settings and controlling user access. so they cannot use functions such as copying and printing. To use such functions, you need to register a user in the address book and then be authenticated as the user. Reference For details, see p.20 "Registering the Administrator". For details, See p.169 "Operations by the Supervisor". ❖ User Administrator This is the administrator who manages personal information in the address book. A user administrator can register/delete users in the address book or change users' personal information. Users registered in the address book can also change and delete their own information. If any of the users forget their password, the user administrator can delete it and create a new one, allowing the user to access the machine again. 11