Windows Authentication
Specify this authentication when using the Windows domain controller to authenticate users who have
their accounts on the directory server. Users cannot be authenticated if they do not have their accounts in
the directory server. Under Windows authentication, you can specify the access limit for each group
registered in the directory server. The Address Book stored in the directory server can be registered to
the machine, enabling user authentication without first using the machine to register individual settings in
the Address Book. Obtaining user information can prevent the use of false identities because the sender's
address (From:) is determined by the authentication system when scanned data is sent or a received fax
message is transferred via e-mail.
Windows authentication can be performed using one of two authentication methods: NTLM or Kerberos
authentication. The operational requirements for both methods are listed below.
Operational requirements for NTLM authentication
To specify NTLM authentication, the following requirements must be met:
• This machine supports NTLMv1 authentication and NTLMv2 authentication.
• A domain controller has been set up in a designated domain.
• This function is supported by the operating systems listed below. To obtain user information
when running Active Directory, use LDAP. If you are using LDAP, we recommend you use SSL
to encrypt communication between the machine and the LDAP server. Encryption by SSL is
possible only if the LDAP server supports TLSv1, SSLv2, or SSLv3.
• Windows Server 2003/2003 R2
• Windows Server 2008/2008 R2
Operational requirements for Kerberos authentication
To specify Kerberos authentication, the following requirements must be met:
• A domain controller must be set up in a designated domain.
• The operating system must support KDC (Key Distribution Center). To obtain user information
when running Active Directory, use LDAP. If you are using LDAP, we recommend you use SSL
to encrypt communication between the machine and the LDAP server. Encryption by SSL is
possible only if the LDAP server supports TLSv1, SSLv2, or SSLv3. Compatible operating
systems are listed below.
• Windows Server 2003/2003 R2
• Windows Server 2008/2008 R2
To use Kerberos authentication under Windows Server 2008, Service Pack 2 or later must be
installed.
• Transmission between the machine and the KDC server is encrypted if Kerberos authentication
is enabled. For details about specifying encrypted transmission, see p.184 "Kerberos
Authentication Encryption Setting".
Windows Authentication
43
Summary of Contents for Aficio MP C3002
Page 7: ...6 ...
Page 15: ...1 Manuals Provided with This Machine 14 ...
Page 39: ...2 Safety Information 38 ...
Page 51: ...3 Information for This Machine 50 ...
Page 54: ...Cover Paper Thickness 0 10 Body Paper Thickness 0 08 Pages in Book 0 Spine Width 0 2011 ...
Page 60: ......
Page 65: ...INDEX 235 5 ...
Page 86: ...1 What You Can Do with This Machine 26 ...
Page 126: ...2 Getting Started 66 ...
Page 128: ...7 When the copy job is finished press the Reset key to clear the settings 3 Copy 68 ...
Page 197: ...Storing the Scanned Documents to a USB Flash Memory or SC Card 6 126D ...
Page 201: ...7 Document Server 130 ...
Page 205: ...8 Web Image Monitor 134 ...
Page 235: ...9 Adding Paper and Toner 164 ...
Page 303: ...10 Troubleshooting 232 ...
Page 309: ...MEMO 238 ...
Page 310: ...MEMO 239 ...
Page 311: ...MEMO 240 EN GB EN US EN AU D143 ...
Page 312: ... 2011 ...
Page 313: ...GB EN D143 7003 US EN AU EN ...
Page 320: ......
Page 360: ...3 Installing the Scanner Driver 40 ...
Page 372: ...5 Troubleshooting 52 ...
Page 378: ...6 Installing the Printer Driver Under Mac OS X 58 ...
Page 382: ...3 Quit uninstaller 7 Appendix 62 ...
Page 386: ...MEMO 66 ...
Page 387: ...MEMO 67 ...
Page 388: ...MEMO 68 EN GB EN US EN AU D143 7038 ...
Page 389: ......
Page 390: ...EN GB EN US EN AU D143 7038 2011 ...
Page 392: ......
Page 398: ...6 ...
Page 440: ...MEMO 48 EN GB EN US EN AU D143 7042 ...
Page 441: ......
Page 442: ...EN GB EN US EN AU D143 7042 2011 ...
Page 444: ......
Page 454: ...10 ...
Page 472: ...1 Getting Started 28 ...
Page 540: ...3 Restricting Machine Usage 96 ...
Page 560: ...4 Preventing Leakage of Information from Machines 116 ...
Page 717: ...7 Press Yes 8 Log out Limiting Machine Operations to Customers Only 273 ...
Page 724: ...7 Managing the Machine 280 ...
Page 829: ......
Page 830: ...EN GB EN US EN AU D143 7040 2011 ...