Ricoh Aficio MP C3000 Security Guide - Page 38

User Authentication

Page 38 highlights

User Authentication User Authentication There are five types of user authentication method: user code authentication, ba- sic authentication, Windows authentication, Integration Server Authentication, and LDAP authentication. To use user authentication, select an authentication method on the control panel, and then make the required settings for the authen- tication. The settings depend on the authentication method. 2 Note ❒ Under user code authentication, authentication is based on the user code. In contrast, under basic authentication, Windows authentication, and LDAP authentication, authentication is carried out for individual users. ❒ User authentication can also be specified via Web Image Monitor. For details see the Web Image Monitor Help. User Code Authentication This is an authentication method for limiting access to functions according to the user code. The same user code can be used by more than one user. For details about specifying user codes, see General Settings Guide. Limitation ❒ To control the use of DeskTopBinder for the delivery of files stored in the ma- chine, select Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication. Reference For details about specifying the user code for the printer driver, see Printer Reference or the printer driver Help. For details about specifying the TWAIN driver user code, see the TWAIN driver Help. 29

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236

User Authentication
29
2
User Authentication
There are five types of user authentication method: user code authentication, ba-
sic authentication, Windows authentication, Integration Server Authentication,
and LDAP authentication. To use user authentication, select an authentication
method on the control panel, and then make the required settings for the authen-
tication. The settings depend on the authentication method.
Note
Under user code authentication, authentication is based on the user code. In
contrast, under basic authentication, Windows authentication, and LDAP au-
thentication, authentication is carried out for individual users.
User authentication can also be specified via Web Image Monitor. For details
see the Web Image Monitor Help.
User Code Authentication
This is an authentication method for limiting access to functions according to the
user code. The same user code can be used by more than one user. For details
about specifying user codes, see General Settings Guide.
Limitation
To control the use of DeskTopBinder for the delivery of files stored in the ma-
chine, select Basic Authentication, Windows Authentication, LDAP Authen-
tication, or Integration Server Authentication.
Reference
For details about specifying the user code for the printer driver, see Printer
Reference or the printer driver Help.
For details about specifying the TWAIN driver user code, see the TWAIN
driver Help.