TABLE OF CONTENTS
Functions That Require Options
.........................................................................................................................
8
Main Software Products
.....................................................................................................................................
9
1. Getting Started
Before Configuring the Security Function Settings
.........................................................................................
11
Before Using This Machine
..............................................................................................................................
12
Administrators
...................................................................................................................................................
14
Configuring Administrator Authentication
......................................................................................................
15
Specifying Administrator Privileges
............................................................................................................
16
Registering and Changing Administrators
.................................................................................................
18
Using Web Image Monitor to Configure Administrator Authentication
..................................................
21
Administrator Login Method
............................................................................................................................
22
Logging in Using the Control Panel
............................................................................................................
22
Logging in Using Web Image Monitor
......................................................................................................
23
Administrator Logout Method
..........................................................................................................................
24
Logging out Using the Control Panel
..........................................................................................................
24
Logging out Using Web Image Monitor
....................................................................................................
24
Supervisor
.........................................................................................................................................................
25
Resetting the Administrator's Password
......................................................................................................
25
Changing the Supervisor
.............................................................................................................................
26
2. Configuring User Authentication
Users
..................................................................................................................................................................
29
About User Authentication
...............................................................................................................................
30
Configuring User Authentication
.....................................................................................................................
31
User Code Authentication
...............................................................................................................................
33
Specifying User Code Authentication
........................................................................................................
33
Basic Authentication
.........................................................................................................................................
37
Specifying Basic Authentication
..................................................................................................................
37
Authentication Information Stored in the Address Book
...........................................................................
39
Specifying Login User Names and Passwords
..........................................................................................
39
Specifying Login Details
..............................................................................................................................
41
Windows Authentication
.................................................................................................................................
43
Specifying Windows Authentication
..........................................................................................................
45
Installing Internet Information Services (IIS) and Certificate Services
......................................................
49
1