e-ManualTopSite mapHelpGlossary

Category Top

Increasing Security

Restricting Access by Authentication

Administrator Settings

Specifying the System Manager Settings

Department ID Management

Specifying Department ID Management

Checking/Printing/Clearing Page Totals

Accepting Jobs with Unknown Department IDs

User Setting Information Management (User Setting Information Management Service)

Logging In to the User Setting Information Management Service Page

Deleting the User Setting Information

User Access Control for Advanced Box

Logging In to the User Management Page

Registering/Editing the User Information of User Access Control for Advanced Box

Editing User Information by General Users

Authentication Log Management for the Advanced Box

Authentication Method Settings for Sending Operations

Specifying Personal Folders

Registering Personal Folders for Each User

Setting Up the Home Folder and Personal Folders

Registering Folders Designated by Login Service as Personal Folders

Specifying Authentication Method for LDAP Server

Specifying Authentication Method for Rights Management Server

Specifying Authentication Method for SMTP Server

Specifying Authentication Method for File Server

Specifying Authentication Method for Advanced Box

Simple Authentication Settings for Secure Print

Setting to Disable Integrated Authentication

Network Security

Key Pair and Server Certificate Settings for Encrypted SSL Communication

Generating a Key Pair and Server Certificate

Registering a Key Pair File and Server Certificate File Installed from a Computer

Editing Key Pairs and Server Certificates

Registering/Editing a CA Certificate File

Verifying Certificate Validity Using Certificate Revocation List

Using an Encryption Method That Complies with FIPS 140-2

Advanced Box Settings

Specifying the Advanced Box Settings

Setting the Network

MEAP Settings

Using the SSL

Printing Installed Application Information

Preventing Information Leakage

Digital Signatures

Setting/Confirming a Key Pair and Device Certificate

Confirming a Key Pair and User Certificate

Checking a Device Signature/User Signature Certificate

Setting a Rights Management Server

Forced Secure Watermark/Document Scan Lock

Secure Watermark (Forced Secure Watermark/Printer Driver Secure Watermark)

Adjusting the Secure Watermark Contrast

Selecting the Code for Document Scan Lock (TL Code/QR Code)

Document Scan Lock Settings (TL Code)

Specifying the Document Scan Lock Operational Settings
Setting the Document Scan Lock Mode (TL Code)
Adjusting the TL Code

Document Scan Lock Settings (QR Code)

Specifying the Document Scan Lock Operational Settings (QR Code)
Setting the Document Scan Lock Mode (QR Code)
Setting the Document Scan Lock Mode and Secure Watermark (QR Code)
Adjusting the QR Code Print Position

Copy Set Numbering Options

Accepting Only Encrypted Secure Printing

Restricting the Send Function

Setting the Address Book

Mail Box Settings

Specifying Settings for All Mail Boxes

Specifying the Mail Box Security Settings

Setting the Control Panel Display

Specifying Management Settings for the Hard Disk

Completely Erasing Unnecessary Data from the Hard Disk

Initializing All Data/Settings

TPM Settings

Device Management

Using the USB Port

Device Information Settings

Specifying Device Information Delivery Settings

Registering/Deleting/Printing Delivery Destinations

Setting Automatic Delivery

Setting Manual Delivery

Setting the Receiving Machine

Checking/Printing the Communication Log

Setting SSO-H Authentication for Device Information Delivery Settings

Limiting Functions

Remote UI

Clearing the Message Board

ACCESS MANAGEMENT SYSTEM

Retrieving Audit Logs

Saving a Log of Key Operations

Available Administrator Settings Table (Touch Panel Display)

IEEE 2600 Security Standard

Top » Security » Restricting Access by Authentication
Restricting Access by Authentication
0CYL-1YS
The authentication on this machine requests user information (user name and password) when users access the machine, and verifies that information. Only an authorized user that has successfully passed the authentication can operate the machine. You can prevent access by unauthorized users by managing the users for the machine. To use the authentication mode, you must first register the information for administrators and general users.
The administrator can restrict various functions such as Copy, Print, and Send that each user can use and limit the maximum number of copies/prints that each user can output. Also, if necessary, the administrator can restrict settings on "Settings/Registration."
Authentication Information (Administrator/General User/Unauthorized User)
The administrator manages the users by restricting access by general user and setting restrictions on operations using the authentication mode. General user privileges can be set per users. By preventing access by unauthorized users, administrators can reduce the threat of tampering of the machine and information leakage.
You can use the following authentication functions:
Department ID Management (Default Authentication)
You can manage the users by department or project by registering the Department ID and PIN. The Department ID Management enables you to restrict various functions such as Copy, Print, and Send that each department can use, and the Page Limits for Copy, Scan, and Print for each department. (See "Department ID Management.")
SSO-H (Single Sign-On H)
The SSO-H enables you to perform user authentication by registering user names and passwords.
There are two types of authentication method: Server Authentication, which performs authentication using the outside server connected to the machine, and Local Device Authentication, which performs authentication using only the machine. You can use both authentication methods at the same time. (See "SSO-H (Single Sign-On H).")
Also, you can limit use of particular device functions for each user using the ACCESS MANAGEMENT SYSTEM. For example, you can restrict Copy/Print functions, such as 2-sided printing, or the use of various settings in Settings/Registration.
User Setting Information Management (User Setting Information Management Service)
This mode enables you to link information such as the user name and password set for each function by each user with the SSO-H user information.
You can delete the user setting information that each user is using from the User Setting Information Management Service page. (See "User Setting Information Management (User Setting Information Management Service).")
User Access Control for Advanced Box
[User Access Control for Advanced Box] enables you to manage user authentication when the Advanced Box on the machine is used, or when the Advanced Box is opened externally on the network and is being used as a server. (See "User Access Control for Advanced Box.")
Authentication Method Settings for Sending Operations
You can specify what type of authentication method you use for accessing personal folders or external servers, and which user name and password you use as authentication information. (See "Authentication Method Settings for Sending Operations.")
Integrated Authentication
This function enables you to use the login information, required to log in to the machine, for other authentication. If the login service supports Integrated Authentication, users who logged in to the machine can operate functions, such as using Advanced Box, sending to personal folders, and accessing the LDAP server or file server, without entering login name and password.
For information whether the login service you are using supports Integrated Authentication, contact your local authorized Canon dealer.
You can disable this function if necessary. (See "Setting to Disable Integrated Authentication.")