Ricoh 3035 Guia De Utilização

Página de 188
63
5. Management Based on
Authentication and Access Control
There are four types of administrator according to the administered function:
Machine administrator, network administrator, file administrator, and user ad-
ministrator.By sharing the administrative work among different administrators,
you can spread the workload and limit unauthorized operation by a single ad-
ministrator.
Users are managed using the personal information registered in the machine’s
address book.
By enabling user authentication, you can allow only people registered in the ad-
dress book to use the machine.
Specify administrator authentication and user authentication according to the
following flowchart:
The Management Function
The machine has an authentication function requiring a login user name and
login password. By using the authentication function, you can specify access
limits for individual users and groups of users. Using access limits, you can not
only limit the machine’s available functions but also protect the machine settings
and files and data stored in the machine.
Important
❒ If you have enabled [Administrator Authentication Management], make sure not to
forget the administrator login user name and login password. If an adminis-
trator login user name or login password is forgotten, a new password must
be specified using the supervisor’s authority.
Administrator Authentication
See p.68 “Administrator Authen-
tication”.
Specifying Administrator Authentication
See p.68 “Administrator Authentication”.
Registering the Administrator
See p.104 “Registering the Administrator”.
User Authentication
See p.68 “Enabling Authentica-
tion”.
Specifying User Authentication
Authentication that requires only the machine:
• User Code Authentication
See p.70 “User Code Authentication”.
• Basic Authentication
See p.71 “Basic Authentication”.
Authentication that requires external devices:
• Windows Authentication
See p.73 “Windows Authentication”.
• LDAP Authentication
See p.79 “LDAP Authentication”.
• Integration Server Authentication
See p.82 “Integration Server Authentication”.