
If any of the users forget their password, the user administrator can delete it and create a new one,
allowing the user to access the machine again.
For instructions on registering the user administrator, see "Registering the Administrator".
Machine Administrator
This is the administrator who mainly manages the machine's default settings. You can set the machine
so that the default for each function can only be specified by the machine administrator. By making
this setting, you can prevent unauthorized people from changing the settings and allow the machine
to be used securely by its many users.
For instructions on registering the machine administrator, see "Registering the Administrator".
Network Administrator
This is the administrator who manages the network settings. You can set the machine so that network
settings such as the IP address and settings for sending and receiving e-mail can only be specified by
the network administrator.
By making this setting, you can prevent unauthorized users from changing the settings and disabling
the machine, and thus ensure correct network operation.
For instructions on registering the network administrator, see "Registering the Administrator".
File Administrator
This is the administrator who manages permission to access stored files. You can specify passwords
to allow only registered users with permission to view and edit files stored in Document Server. By
making this setting, you can prevent data leaks and tampering due to unauthorized users viewing and
using the registered data.
For instructions on registering the file administrator, see "Registering the Administrator".
Supervisor
The supervisor can delete an administrator's password and specify a new one. The supervisor cannot
specify defaults or use normal functions. However, if any of the administrators forget their password
and cannot access the machine, the supervisor can provide support.
For instructions on registering the supervisor, see "Supervisor Operations".
• p.30 "Registering the Administrator"
• p.271 "Supervisor Operations"
User
Users are managed using the personal information in the machine's Address Book.
By enabling user authentication, you can allow only people registered in the Address Book to use the
machine. Users can be managed in the Address Book by the user administrator.
2. Authentication and its Application
20
2
Summary of Contents for C6055
Page 12: ...10...
Page 47: ...5 Press OK 6 Press Exit 7 Press the User Tools Counter key User Code Authentication 45 2...
Page 57: ...p 50 Specifying Login User Name and Login Password Basic Authentication 55 2...
Page 168: ...3 Ensuring Information Security 166 3...
Page 245: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 243 6...
Page 250: ...6 Specifying the Extended Security Functions 248 6...
Page 272: ...7 Troubleshooting 270 7...
Page 359: ...Windows Authentication Operational Requirements for NTLM authentication 56 357...
Page 360: ...MEMO 358...
Page 361: ...MEMO 359...
Page 362: ...MEMO 360 EN USA D015 7902...