Management Based on Authentication and Access Control
66
5
Administrators and Users
When controlling access using the authentication specified by an administrator,
select the machine’s administrator, enable the authentication function, and then
use the machine.
The administrators manage access to the allocated functions, and users can use
only the functions they are permitted to access. To enable the authentication
function, the login user name and login password are required in order to use
the machine.
When specifying user authentication, specify administrator authentication as
well.
Important
❒
If user authentication is not possible because of a problem with the hard disk
or network, you can use the machine by accessing it using administrator au-
thentication and disabling user authentication. Do this if, for instance, you
need to use the machine urgently. For details, see the Web Image Monitor
Help.
Reference
For details, see p.88 “Specifying Login User Name and Login Password”.
For details, see p.121 “Operations by the Supervisor”.
Administrator
There are four types of administrator according to the administered function:
machine administrator, network administrator, file administrator, and user ad-
ministrator.
By sharing the administrative work among different administrators, you can
spread the workload and limit unauthorized operation by a single administra-
tor.
Administrators are limited to managing the machine’s settings and controlling
user access. so they cannot use functions such as copying and printing. To use
such functions, you need to register a user in the address book and then be au-
thenticated as the user.
Note
❒
By sharing the administrative work among different administrators, you can
spread the workload and limit unauthorized operation by a single adminis-
trator. We recommend only one person take each administrator role.
Reference
For details, see p.99 “The Roles of Administrators”.
For details, see p.104 “Registering the Administrator”.
Содержание Aficio 3035
Страница 10: ...2...
Страница 52: ...Preventing Unauthorized Use of Functions and Settings 44 3...
Страница 184: ...176 MEMO...
Страница 185: ...177 MEMO...
Страница 186: ...178 EN USA AE AE B198 6707 MEMO...
Страница 187: ...Copyright 2005...
Страница 188: ...B1986707 Operating Instructions Security Reference Printed in China EN USA AE AE B198 6707...