TABLE OF CONTENTS
Functions That Require Options
.........................................................................................................................
9
Main Software Names
....................................................................................................................................
10
1. Getting Started
Before Configuring the Security Function Settings
.........................................................................................
11
Before Using This Machine
..............................................................................................................................
12
Administrators and Users
.................................................................................................................................
14
Administrators
...................................................................................................................................................
15
Configuring Administrator Authentication
......................................................................................................
16
Specifying Administrator Privileges
............................................................................................................
17
Registering and Changing Administrators
.................................................................................................
19
Using Web Image Monitor to Configure Administrator Authentication
..................................................
22
Administrator Login Method
............................................................................................................................
23
Logging in Using the Control Panel
............................................................................................................
23
Logging in Using Web Image Monitor
......................................................................................................
24
Administrator Logout Method
..........................................................................................................................
25
Logging out Using the Control Panel
..........................................................................................................
25
Logging out Using Web Image Monitor
....................................................................................................
25
Supervisor
.........................................................................................................................................................
26
Resetting the Administrator's Password
......................................................................................................
26
Changing the Supervisor
.............................................................................................................................
27
2. Configuring User Authentication
Users
..................................................................................................................................................................
29
About User Authentication
...............................................................................................................................
30
Configuring User Authentication
.....................................................................................................................
31
User Code Authentication
...............................................................................................................................
34
Basic Authentication
.........................................................................................................................................
37
Specifying Basic Authentication
..................................................................................................................
37
Authentication Information Stored in the Address Book
...........................................................................
39
Specifying Login User Names and Passwords
..........................................................................................
40
Specifying Login Details
..............................................................................................................................
41
Windows Authentication
.................................................................................................................................
43
Specifying Windows Authentication
..........................................................................................................
45
Installing Internet Information Services (IIS) and Certificate Services
......................................................
49
1