
TABLE OF CONTENTS
Before Configuring the Security Function Settings........................................................................................... 7
Before Using This Machine................................................................................................................................ 8
Administrators and Users................................................................................................................................... 9
Administrators...................................................................................................................................................10
Configuring Administrator Authentication...................................................................................................... 11
Specifying Administrator Privileges............................................................................................................ 12
Registering and Changing Administrators................................................................................................. 14
Using Web Image Monitor to Configure Administrator Authentication..................................................16
Logging in Using the Control Panel............................................................................................................ 17
Logging in Using Web Image Monitor...................................................................................................... 18
Resetting the Administrator's Password...................................................................................................... 20
Changing the Supervisor.............................................................................................................................21
2. Configuring User Authentication
Users..................................................................................................................................................................23
About User Authentication...............................................................................................................................24
Configuring User Authentication.....................................................................................................................25
User Code Authentication............................................................................................................................... 27
Basic Authentication.........................................................................................................................................29
Specifying Basic Authentication..................................................................................................................29
Authentication Information Stored in the Address Book........................................................................... 30
Specifying Login User Names and Passwords..........................................................................................30
Specifying Windows Authentication.......................................................................................................... 33
Installing Internet Information Services (IIS) and Certificate Services......................................................36
Creating the Server Certificate................................................................................................................... 38
LDAP Authentication.........................................................................................................................................39
Printer Job Authentication................................................................................................................................ 43
1
Содержание PRO C9100
Страница 2: ......
Страница 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...
Страница 24: ...1 Getting Started 22...
Страница 72: ...4 Preventing Leakage of Information from Machines 70...
Страница 116: ...5 Enhanced Network Security 114...
Страница 176: ...6 Managing the Machine 174...
Страница 188: ...7 Troubleshooting 186...
Страница 218: ...System Log Settings User Mach N W File Unset Set System Log R R R R R 8 List of Operation Privileges for Settings 216...
Страница 220: ...Settings User Mach N W File Unset Set Device Access Violation R W 8 List of Operation Privileges for Settings 218...
Страница 235: ......
Страница 236: ...EN GB EN US EN AU M238 1022 2014...