
Windows Authentication
Specify this authentication when using the Windows domain controller to authenticate users who have their
accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the
directory server. Under Windows authentication, you can specify the access limit for each group registered
in the directory server. The Address Book stored in the directory server can be registered to the machine,
enabling user authentication without first using the machine to register individual settings in the Address
Book. If you can obtain user information, the sender's address (From:) is fixed to prevent unauthorized
access when sending e-mails under the scanner function and forwarding received e-mails.
Windows authentication can be performed using one of two authentication methods: NTLM or Kerberos
authentication. The operational requirements for both methods are listed below.
Operational Requirements for NTLM authentication
To specify NTLM authentication, the following requirements must be met:
• This machine only supports NTLMv1 authentication.
• A domain controller has been set up in a designated domain.
• This function is supported by the operating systems listed below. To obtain user information when
running Active Directory, use LDAP. If SSL is being used, a version of Windows that supports TLS
v1, SSL v2, or SSL v3 is required.
• Windows NT 4.0 Server
• Windows 2000 Server
• Windows Server 2003
Operational Requirements for Kerberos authentication
To specify Kerberos authentication, the following requirements must be met:
• A domain controller must be set up in a designated domain.
• The operating system must be able to support KDC (Key Distribution Center). To obtain user
information when running Active Directory, use LDAP. If SSL is being used, a version of Windows
that supports TLSv1, SSLv2, or SSLv3 is required. Compatible operating systems are listed below.
• Windows 2000 Server
• Windows Server 2003
• During Windows Authentication, data registered in the directory server, such as the user's e-mail
address, is automatically registered in the machine. If user information on the server is changed,
information registered in the machine may be overwritten when authentication is performed.
• Users managed in other domains are subject to user authentication, but they cannot obtain items such
as e-mail addresses.
2. Authentication and its Application
56
2
Содержание C6055
Страница 12: ...10...
Страница 47: ...5 Press OK 6 Press Exit 7 Press the User Tools Counter key User Code Authentication 45 2...
Страница 53: ...4 Press Address Book Management 5 Select the user or group 6 Press Auth Info Basic Authentication 51 2...
Страница 57: ...p 50 Specifying Login User Name and Login Password Basic Authentication 55 2...
Страница 126: ...4 Press Address Book Management 5 Select the user or group 6 Press Protection 3 Ensuring Information Security 124 3...
Страница 168: ...3 Ensuring Information Security 166 3...
Страница 175: ...5 Select the menu protect level and then press OK 6 Press the User Tools Counter key Menu Protect 173 4...
Страница 177: ...3 Press Administrator Tools 4 Press Address Book Management 5 Select the user Limiting Available Functions 175 4...
Страница 190: ...2 Press System Settings 3 Press Interface Settings 4 Press Effective Protocol 5 Enhanced Network Security 188 5...
Страница 197: ...2 Press System Settings 3 Press Administrator Tools 4 Press Extended Security Encrypting Transmitted Passwords 195 5...
Страница 245: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 243 6...
Страница 250: ...6 Specifying the Extended Security Functions 248 6...
Страница 272: ...7 Troubleshooting 270 7...
Страница 359: ...Windows Authentication Operational Requirements for NTLM authentication 56 357...
Страница 360: ...MEMO 358...
Страница 361: ...MEMO 359...
Страница 362: ...MEMO 360 EN USA D015 7902...