e-Manual TopContentsHelpGlossary
Category
Top » Security » Restricting Access by Authentication

Category Top

Increasing Security

Restricting Access by Authentication

Administrator Settings

Specifying the System Manager Settings

Department ID Management

Specifying Department ID Management

Checking/Printing/Clearing Page Totals

Accepting Jobs with Unknown Department IDs

User Setting Information Management (User Setting Information Management Service)

Logging In to the User Setting Information Management Service Page

Deleting the User Setting Information

User Access Control for Advanced Box

Logging In to the User Management Page

Registering/Editing the User Information of User Access Control for Advanced Box

Editing User Information by General Users

Authentication Screen Displayed on the Touch Panel Display

Network Security

Key Pair and Server Certificate Settings for Encrypted SSL Communication

Generating a Key Pair and Server Certificate

Registering a Key Pair File and Server Certificate File Installed from a Computer

Editing Key Pairs and Server Certificates

Registering/Editing a CA Certificate File

Using an Encryption Method That Complies with FIPS 140-2

Advanced Box Settings

Specifying the Advanced Box Settings

Setting the Network

MEAP Settings

Using the SSL

Printing Installed Application Information

Preventing Information Leakage

Generating and Confirming a Key Pair and Device Signature Certificate and User Certificate for Adding Digital Signatures to PDF or XPS Files

Setting/Confirming a Key Pair and Device Certificate

Confirming a Key Pair and User Certificate

Checking a Device Signature/User Signature Certificate

Setting a Rights Management Server

Secure Watermark/Document Scan Lock

Secure Watermark

Document Scan Lock

Adjusting the Secure Watermark Contrast

Adjusting Embedded Dots

Specifying the Document Scan Lock Operational Settings

Copy Set Numbering Options

Accepting Only Encrypted Secured Printing

Restricting the Send Function

Setting the Address Book

Mail Box Settings

Specifying Settings for All Mail Boxes

Specifying the Mail Box Security Settings

Setting the Control Panel Display

Specifying Management Settings for the Hard Disk

Completely Erasing Unnecessary Data from the Hard Disk

Initializing All Data/Settings

TPM Settings

Device Management

Using the USB Port

Device Information Settings

Specifying Device Information Delivery Settings

Registering/Deleting/Printing Delivery Destinations

Setting Automatic Delivery

Setting Manual Delivery

Setting the Receiving Machine

Checking/Printing the Communication Log

Limiting Functions

Remote UI

Clearing the Message Board

Retrieving Audit Logs

Available Administrator Settings Table (Touch Panel Display)

IEEE 2600 Security Standard

Collapse all|Expand all
Restricting Access by Authentication
The authentication on this machine requests user information (user name and password) when users access the machine, and verifies that information. Only an authorized user that has successfully passed the authentication can operate the machine. You can prevent access by unauthorized users by managing the users for the machine. To use the authentication mode, you must first register the information for administrators and general users.
The administrator can restrict various functions such as Copy, Print, and Send that each user can use and limit the maximum number of copies/prints that each user can output. Also, if necessary, the administrator can restrict settings on "Settings/Registration."
Authentication Information (Administrator/General User/Unauthorized User)
The administrator manages the users by restricting access by general user and setting restrictions on operations using the authentication mode. General user privileges can be set per users. By preventing access by unauthorized users, administrators can reduce the threat of tampering of the machine and information leakage.
You can use the following authentication functions:
Department ID Management (Default Authentication)
You can manage the users by department or project by registering the Department ID and PIN. The Department ID Management enables you to restrict various functions such as Copy, Print, and Send that each department can use, and the Page Limits for Copy, Scan, and Print for each department. (See "Department ID Management.")
SSO-H (Single Sign-On H)
The SSO-H enables you to perform user authentication by registering user names and passwords.
There are two types of authentication method: Domain Authentication, which performs login authentication for the machine and authentication of the domain on the network in conjunction with the domain controller of the Active Directory, and Local Device Authentication, which performs authentication using only the machine. You can use both authentication methods at the same time. (See "SSO-H (Single Sign-On H).")
Also, you can limit use of particular device functions for each user using the ACCESS MANAGEMENT SYSTEM. (For information on the optional products required to use access management, see "Optional Products Required for Each Function.") For example, you can restrict Copy/Print functions, such as 2-sided printing, or the use of various settings in Settings/Registration.
User Setting Information Management (User Setting Information Management Service)
This mode enables you to link information such as the user name and password set for each function by each user with the SSO-H user information.
You can delete the user setting information that each user is using from the User Setting Information Management Service page. (See "User Setting Information Management (User Setting Information Management Service).")
User Access Control for Advanced Box
[User Access Control for Advanced Box] enables you to manage user authentication when the Advanced Box on the machine is used, or when the Advanced Box is opened externally on the network and is being used as a server. (See "User Access Control for Advanced Box.")