
2. Authentication and its Application
This chapter describes how to register the administrator and specify the authentication methods. How to
log on and log off once authentication is enabled is also described here.
Administrators and Users
When controlling access using the authentication method specified by an administrator, select the machine's
administrator, enable the authentication function, and then use the machine.
The administrators manage access to the allocated functions, and users can use only the functions they are
permitted to access. When the authentication function is enabled, the login user name and login password
are required in order to use the machine.
Specify administrator authentication, and then specify user authentication.
For details about specifying a login user name and password, see "Specifying Login User Name and Login
Password".
• If user authentication is not possible because of a problem with the hard disk or network, you can use
the machine by accessing it using administrator authentication and disabling user authentication. Do
this if, for instance, you need to use the machine urgently.
• p.50 "Specifying Login User Name and Login Password"
Administrators
There are four types of administrators: machine administrator, network administrator, file administrator,
and user administrator.
Sharing administrator tasks eases the burden on individual administrators while also limiting unauthorized
operation by administrators. You can also specify a supervisor who can change each administrator's
password. Administrators are limited to managing the machine's settings and controlling user access, so
they cannot use functions such as copying and printing. To use these functions, the administrator must register
as a user in the Address Book and then be authenticated as the user.
User Administrator
This is the administrator who manages personal information in the Address Book.
A user administrator can register/delete users in the Address Book or change users' personal
information.
Users registered in the Address Book can also change and delete their own information.
19
2
Summary of Contents for C6055
Page 12: ...10...
Page 47: ...5 Press OK 6 Press Exit 7 Press the User Tools Counter key User Code Authentication 45 2...
Page 57: ...p 50 Specifying Login User Name and Login Password Basic Authentication 55 2...
Page 168: ...3 Ensuring Information Security 166 3...
Page 245: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 243 6...
Page 250: ...6 Specifying the Extended Security Functions 248 6...
Page 272: ...7 Troubleshooting 270 7...
Page 359: ...Windows Authentication Operational Requirements for NTLM authentication 56 357...
Page 360: ...MEMO 358...
Page 361: ...MEMO 359...
Page 362: ...MEMO 360 EN USA D015 7902...