![Aficio Pro C550EX Manual Download Page 12](http://html1.mh-extra.com/html/aficio/pro-c550ex/pro-c550ex_manual_2864412012.webp)
Basically, administrators make machine settings and manage the machine; but they cannot perform
normal operations, such as copying.
User
A user performs normal operations on the machine, such as copying.
File Creator (Owner)
This is a user who can store files in the machine and authorize other users to view, edit, or delete those
files.
Registered User
Users with personal information registered in the Address Book who have a login password and user
name.
Administrator Authentication
Administrators are authenticated by their login user name and login password, supplied by the
administrator, when specifying the machine's settings or accessing the machine over the network.
User Authentication
Users are authenticated by a login user name and login password, supplied by the user, when
specifying the machine's settings or accessing the machine over the network.
The user's login user name and password, as well as other items of information, are stored in the
machine's Address Book. Personal information can be obtained from the Windows domain controller
(Windows authentication) or LDAP Server (LDAP authentication), connected to the machine via the
network.
Login
This action is required for administrator authentication and user authentication. Enter your login user
name and login password on the machine's control panel. A login user name and login password
may also be required when accessing the machine over the network or using such utility as Web
Image Monitor.
Logout
This action is required with administrator and user authentication. This action is required when you
have finished using the machine or changing the settings.
Setting Up the Machine
If you want higher security, make the following setting before using the machine:
1.
Turn the machine on.
2.
Press the [User Tools/Counter] key.
1. Getting Started
10
1
Summary of Contents for Pro C550EX
Page 9: ...INDEX 229 7...
Page 18: ...1 Getting Started 16 1...
Page 68: ...2 Authentication and its Application 66 2...
Page 95: ...To resume overwriting turn on the main power Deleting Data on the Hard Disk 93 3...
Page 96: ...3 Ensuring Information Security 94 3...
Page 104: ...4 Managing Access to the Machine 102 4...
Page 148: ...5 Enhanced Network Security 146 5...
Page 157: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 155 6...
Page 162: ...6 Specifying the Extended Security Functions 160 6...
Page 180: ...7 Troubleshooting 178 7...
Page 196: ...Login Password Change Encryption Password Webpage Download Help File 8 Appendix 194 8...
Page 225: ...Settings A B C Program Change Delete R W N A N A Device Settings 223 8...
Page 233: ...MEMO 231...
Page 234: ...MEMO 232 EN USA D0797508...