2. Configuring User Authentication
This chapter describes how to specify user authentication and explains the functions that are enabled by
user authentication.
Users
A user performs normal operations on the machine, such as printing. Users are managed using the
information in the machine's Address Book and can only use the functions they are permitted to access
by administrators. By enabling user authentication, you can allow only people registered in the Address
Book to use the machine. Users can be managed in the Address Book by the user administrator. For
details about administrators, see page 10 "Administrators". For details about user registration in the
Address Book, see "Registering User Information", Connecting the Machine/ System Settings or Web
Image Monitor Help.
23
Содержание PRO C9100
Страница 2: ......
Страница 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...
Страница 24: ...1 Getting Started 22...
Страница 72: ...4 Preventing Leakage of Information from Machines 70...
Страница 116: ...5 Enhanced Network Security 114...
Страница 176: ...6 Managing the Machine 174...
Страница 188: ...7 Troubleshooting 186...
Страница 218: ...System Log Settings User Mach N W File Unset Set System Log R R R R R 8 List of Operation Privileges for Settings 216...
Страница 220: ...Settings User Mach N W File Unset Set Device Access Violation R W 8 List of Operation Privileges for Settings 218...
Страница 235: ......
Страница 236: ...EN GB EN US EN AU M238 1022 2014...