User Authentication
There are four types of user authentication methods: User Code authentication, Basic authentication,
Windows authentication and LDAP authentication. To use user authentication, select an authentication
method on the control panel, and then make the required settings for the authentication. The settings depend
on the authentication method.
• User Code authentication is used for authenticating on the basis of a user code, and Basic
authentication, Windows authentication and LDAP authentication are used for authenticating
individual users.
• A user code account that has no more than eight digits and is used for User Code authentication, can
be carried over and used as a login user name even after the authentication method has switched
from User Code authentication to Basic authentication, Windows authentication or LDAP
authentication. In this case, since the User Code authentication does not have a password, the login
password is set as blank.
• When authentication switches to an external authentication method (Windows authentication or LDAP
authentication), authentication will not occur, unless the external authentication device has the carried
over user code account previously registered. However, the user code account will remain in the
Address Book of the machine despite an authentication failure. From a security perspective, when
switching from User Code authentication to another authentication method, we recommend that you
delete accounts you are not going to use, or set up a login password. For details about deleting
accounts, see "Deleting a Registered Name", General Settings Guide. For details about changing
passwords, see "Specifying Login User Name and Login Password".
• You cannot use more than one authentication method at the same time.
• User authentication can also be specified via Web Image Monitor. For details see Web Image
Monitor Help.
• p.43 "Specifying Login User Name and Login Password"
2. Authentication and its Application
38
2
Содержание Pro C550EX
Страница 9: ...INDEX 229 7...
Страница 18: ...1 Getting Started 16 1...
Страница 68: ...2 Authentication and its Application 66 2...
Страница 95: ...To resume overwriting turn on the main power Deleting Data on the Hard Disk 93 3...
Страница 96: ...3 Ensuring Information Security 94 3...
Страница 102: ...3 Press Administrator Tools 4 Press Address Book Management 5 Select the user 4 Managing Access to the Machine 100 4...
Страница 104: ...4 Managing Access to the Machine 102 4...
Страница 148: ...5 Enhanced Network Security 146 5...
Страница 157: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 155 6...
Страница 162: ...6 Specifying the Extended Security Functions 160 6...
Страница 180: ...7 Troubleshooting 178 7...
Страница 196: ...Login Password Change Encryption Password Webpage Download Help File 8 Appendix 194 8...
Страница 225: ...Settings A B C Program Change Delete R W N A N A Device Settings 223 8...
Страница 233: ...MEMO 231...
Страница 234: ...MEMO 232 EN USA D0797508...
Страница 236: ...Operating Instructions Security Reference D079 7508 EN USA Type for Pro C550EX Type for Pro C700EX...