Gestetner dsc525 Guide De Référence

Page de 236
iii
TABLE OF CONTENTS
Manuals for This Machine ...................................................................................... i
How to Read This Manual ..................................................................................... 1
Symbols .....................................................................................................................1
1. Getting Started
Enhanced Security................................................................................................. 3
Glossary .....................................................................................................................4
Setting Up the Machine..............................................................................................5
Security Measures Provided by this Machine..................................................... 7
Using Authentication and Managing Users ................................................................7
Preventing Information Leaks ....................................................................................7
Limiting and Controlling Access ................................................................................. 9
Enhanced Network Security.....................................................................................10
2. Authentication and its Application
Administrators and Users ................................................................................... 11
Administrators .......................................................................................................... 11
User..........................................................................................................................12
The Management Function ................................................................................. 13
About Administrator Authentication.......................................................................... 14
About User Authentication .......................................................................................15
Enabling Authentication...................................................................................... 16
Authentication Setting Procedure.............................................................................16
Administrator Authentication ............................................................................. 17
Specifying Administrator Privileges.......................................................................... 17
Registering the Administrator...................................................................................20
Logging on Using Administrator Authentication .......................................................23
Logging off Using Administrator Authentication .......................................................26
Changing the Administrator...................................................................................... 27
User Authentication............................................................................................. 29
User Code Authentication ........................................................................................29
Basic Authentication.................................................................................................33
Windows Authentication........................................................................................... 42
LDAP Authentication ................................................................................................ 50
Integration Server Authentication.............................................................................57
If User Authentication is Specified..................................................................... 66
User Code Authentication (Using the Control Panel)............................................... 66
User Code Authentication (Using a Printer Driver) ..................................................66
Login (Using the Control Panel) ............................................................................... 67
Log Off (Using the Control Panel) ............................................................................ 68
Login (Using a Printer Driver)...................................................................................69
Login (Using Web Image Monitor) ...........................................................................69
Log Off (Using Web Image Monitor) ........................................................................69
Auto Logout..............................................................................................................70
Authentication using an external device...................................................................71
AthenaC1_Sec_F7-EN_FM_forPaper.book  Page iii  Monday, March 20, 2006  3:07 PM