2. Authentication and its Application
This chapter describes how to register the administrator and specify the authentication methods. How to
log on and log off once authentication is enabled is also described here.
Administrators and Users
When controlling access using the authentication method specified by an administrator, select the machine's
administrator, enable the authentication function, and then use the machine.
The administrators manage access to the allocated functions, and users can use only the functions they are
permitted to access. When the authentication function is enabled, the login user name and login password
are required in order to use the machine.
Specify administrator authentication, and then specify user authentication.
For details about specifying a login user name and password, see "Specifying Login User Name and Login
Password".
• If user authentication is not possible because of a problem with the hard disk or network, you can use
the machine by accessing it using administrator authentication and disabling user authentication. Do
this if, for instance, you need to use the machine urgently.
• p.43 "Specifying Login User Name and Login Password"
Administrators
There are four types of administrators: machine administrator, network administrator, file administrator,
and user administrator.
Sharing administrator tasks eases the burden on individual administrators while also limiting unauthorized
operation by administrators. You can also specify a supervisor who can change each administrator's
password. Administrators are limited to managing the machine's settings and controlling user access, so
they cannot use functions such as copying. To use these functions, the administrator must register as a user
in the Address Book and then be authenticated as the user.
User Administrator
This is the administrator who manages personal information in the Address Book.
A user administrator can register/delete users in the Address Book or change users' personal
information.
Users registered in the Address Book can also change and delete their own information.
17
2
Summary of Contents for Pro C550EX
Page 9: ...INDEX 229 7...
Page 18: ...1 Getting Started 16 1...
Page 68: ...2 Authentication and its Application 66 2...
Page 95: ...To resume overwriting turn on the main power Deleting Data on the Hard Disk 93 3...
Page 96: ...3 Ensuring Information Security 94 3...
Page 104: ...4 Managing Access to the Machine 102 4...
Page 148: ...5 Enhanced Network Security 146 5...
Page 157: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 155 6...
Page 162: ...6 Specifying the Extended Security Functions 160 6...
Page 180: ...7 Troubleshooting 178 7...
Page 196: ...Login Password Change Encryption Password Webpage Download Help File 8 Appendix 194 8...
Page 225: ...Settings A B C Program Change Delete R W N A N A Device Settings 223 8...
Page 233: ...MEMO 231...
Page 234: ...MEMO 232 EN USA D0797508...