![Aficio Pro C550EX Manual Download Page 50](http://html1.mh-extra.com/html/aficio/pro-c550ex/pro-c550ex_manual_2864412050.webp)
Windows Authentication
Specify this authentication when using the Windows domain controller to authenticate users who have their
accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the
directory server. Under Windows authentication, you can specify the access limit for each group registered
in the directory server. The Address Book stored in the directory server can be registered to the machine,
enabling user authentication without first using the machine to register individual settings in the Address
Book.
Windows authentication can be performed using one of two authentication methods: NTLM or Kerberos
authentication. The operational requirements for both methods are listed below.
Operational Requirements for NTLM authentication
To specify NTLM authentication, the following requirements must be met:
• This machine only supports NTLMv1 authentication.
• A domain controller has been set up in a designated domain.
• This function is supported by the operating systems listed below. To obtain user information when
running Active Directory, use LDAP. If SSL is being used, a version of Windows that supports TLS
v1, SSL v2, or SSL v3 is required.
• Windows NT 4.0 Server
• Windows 2000 Server
• Windows Server 2003
Operational Requirements for Kerberos authentication
To specify Kerberos authentication, the following requirements must be met:
• A domain controller must be set up in a designated domain.
• The operating system must be able to support KDC (Key Distribution Center). To obtain user
information when running Active Directory, use LDAP. If SSL is being used, a version of Windows
that supports TLSv1, SSLv2, or SSLv3 is required. Compatible operating systems are listed below.
• Windows 2000 Server
• Windows Server 2003
• During Windows Authentication, data registered in the directory server, such as the user name, is
automatically registered in the machine. If user information on the server is changed, information
registered in the machine may be overwritten when authentication is performed.
• If you have created a new user in the domain controller and selected "User must change password
at next logon", log on to the machine from the computer to change the password before logging on
from the machine's control panel.
• If the authenticating server only supports NTLM when Kerberos authentication is selected on the
machine, the authenticating method will automatically switch to NTLM.
2. Authentication and its Application
48
2
Summary of Contents for Pro C550EX
Page 9: ...INDEX 229 7...
Page 18: ...1 Getting Started 16 1...
Page 68: ...2 Authentication and its Application 66 2...
Page 95: ...To resume overwriting turn on the main power Deleting Data on the Hard Disk 93 3...
Page 96: ...3 Ensuring Information Security 94 3...
Page 104: ...4 Managing Access to the Machine 102 4...
Page 148: ...5 Enhanced Network Security 146 5...
Page 157: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 155 6...
Page 162: ...6 Specifying the Extended Security Functions 160 6...
Page 180: ...7 Troubleshooting 178 7...
Page 196: ...Login Password Change Encryption Password Webpage Download Help File 8 Appendix 194 8...
Page 225: ...Settings A B C Program Change Delete R W N A N A Device Settings 223 8...
Page 233: ...MEMO 231...
Page 234: ...MEMO 232 EN USA D0797508...