Ricoh Aficio MP C3000 Security Guide - Page 23

About Administrator Authentication

Page 23 highlights

Authentication and its Application About Administrator Authentication There are four types of administrator: user administrator, machine administrator, network administrator, and file administrator. 2 1. User Administrator This administrator manages personal information in the address book. You can register/delete users in the address book or change users' personal information. 2. Machine Administrator This administrator manages the machine's default settings. You can set the machine so that the default such as data security for copying function and delete all logs can be specified by the machine administrator. 3. Network Administrator This administrator manages the network settings. You can set the machine so that network settings such as the IP address and settings for sending and receiving email can be specified by the network administrator only. AYJ002S 4. File Administrator This administrator manages permission to access stored files. You can specify passwords for the files stored in the Document Server so only authorized users can view and change them. 5. Authentication Administrators must enter their login user name and password to be authenticated. 6. This machine 7. Administrators manage the ma- chine's settings and access limits. For details about each administrator, see p.11 "Administrators". 14

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236

Authentication and its Application
14
2
About Administrator Authentication
There are four types of administrator: user administrator, machine administra-
tor, network administrator, and file administrator.
1.
User Administrator
This administrator manages personal in-
formation in the address book. You can
register/delete users in the address book
or change users’ personal information.
2.
Machine Administrator
This administrator manages the ma-
chine’s default settings. You can set the
machine so that the default such as data
security for copying function and delete
all logs can be specified by the machine
administrator.
3.
Network Administrator
This administrator manages the network
settings. You can set the machine so that
network settings such as the IP address
and settings for sending and receiving e-
mail can be specified by the network ad-
ministrator only.
4.
File Administrator
This administrator manages permission
to access stored files. You can specify
passwords for the files stored in the Doc-
ument Server so only authorized users
can view and change them.
5.
Authentication
Administrators must enter their login
user name and password to be authenti-
cated.
6.
This machine
7.
Administrators manage the ma-
chine’s settings and access limits.
For details about each administrator,
see p.11 “Administrators”.
AYJ002S