Authentication Information Stored in the Address Book
If you have enabled user authentication, you can specify access limits and usage limits to the machine's
functions for each user or group of users. Specify the necessary settings in the Address Book entry of
each user. For details about the functions that can be limited, see page 50 "Limiting Available
Functions".
Users must have a registered account in the Address Book in order to use the machine when user
authentication is specified. For details about user registration in the Address Book, see "Registering User
Information", Connecting the Machine/ System Settings.
User authentication can also be specified via Web Image Monitor. For details, see Web Image Monitor
Help.
Specifying Login User Names and Passwords
In "Address Book Management", specify the login user name and password to be used for "User
Authentication Management".
For the characters that can be used for login user names and passwords, see page 15 "Usable
characters for user names and passwords".
1.
Log in as the user administrator from the control panel.
2.
Press [Address Book Mangmnt].
3.
Select the user.
2. Configuring User Authentication
30
Содержание PRO C9100
Страница 2: ......
Страница 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...
Страница 24: ...1 Getting Started 22...
Страница 72: ...4 Preventing Leakage of Information from Machines 70...
Страница 116: ...5 Enhanced Network Security 114...
Страница 176: ...6 Managing the Machine 174...
Страница 188: ...7 Troubleshooting 186...
Страница 218: ...System Log Settings User Mach N W File Unset Set System Log R R R R R 8 List of Operation Privileges for Settings 216...
Страница 220: ...Settings User Mach N W File Unset Set Device Access Violation R W 8 List of Operation Privileges for Settings 218...
Страница 235: ......
Страница 236: ...EN GB EN US EN AU M238 1022 2014...