
To enable Kerberos authentication, a realm must be registered beforehand. A realm name must be
registered in capital letters. For details about registering a realm, see "Programming the Realm",
Connecting the Machine/ System Settings.
Up to 5 realms can be registered.
9.
Press [Change] for "Domain Name", enter the name of the domain controller to be
authenticated, and then press [OK].
10.
Press [ Next].
11.
Press [On] for "Use Secure Connection (SSL)".
If you are not using secure sockets layer (SSL) for authentication, press [Off].
If you have not registered a global group, proceed to Step 18.
If you have registered a global group, proceed to Step 12.
If global groups have been registered under Windows server, you can limit the use of functions for
each global group.
You need to create global groups in the Windows server in advance and register in each group the
users to be authenticated. You also need to register in the machine the functions available to the
global group members. Create global groups in the machine by entering the names of the global
groups registered in the Windows Server. (Keep in mind that group names are case-sensitive.)
Then, specify the machine functions available to each group.
If global groups are not specified, users can use the functions specified in [*Default Group]. If
global groups are specified, users not registered in global groups can use the functions specified in
[*Default Group]. By default, all functions are available to *Default Group members. Specify the
limitation on available functions according to user needs.
12.
Press [ Next].
13.
Under "Group", press [Program / Change], and then press [* Not Programmed].
14.
Press [Change] for "Group Name", and then enter the group name.
15.
Press [OK].
16.
In "Other Functions", select which of the machine's functions you want to permit.
Windows Authentication will be applied to the selected functions.
Windows Authentication
35
Содержание PRO C9100
Страница 2: ......
Страница 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...
Страница 24: ...1 Getting Started 22...
Страница 72: ...4 Preventing Leakage of Information from Machines 70...
Страница 116: ...5 Enhanced Network Security 114...
Страница 176: ...6 Managing the Machine 174...
Страница 188: ...7 Troubleshooting 186...
Страница 218: ...System Log Settings User Mach N W File Unset Set System Log R R R R R 8 List of Operation Privileges for Settings 216...
Страница 220: ...Settings User Mach N W File Unset Set Device Access Violation R W 8 List of Operation Privileges for Settings 218...
Страница 235: ......
Страница 236: ...EN GB EN US EN AU M238 1022 2014...