3. Configuring User Authentication
Users..................................................................................................................................................................39
About User Authentication...............................................................................................................................40
Configuring User Authentication.....................................................................................................................41
Enabling User Authentication..........................................................................................................................42
User Code Authentication...............................................................................................................................43
Specifying User Code Authentication........................................................................................................43
Basic Authentication.........................................................................................................................................47
Specifying Basic Authentication..................................................................................................................
47
Authentication Information Stored in the Address Book...........................................................................50
Specifying Login User Names and Passwords..........................................................................................50
Specifying Login Details..............................................................................................................................52
Windows Authentication.................................................................................................................................54
Specifying Windows Authentication..........................................................................................................55
Installing Internet Information Services (IIS) and Certificate Services......................................................63
Creating the Server Certificate...................................................................................................................64
Installing the Device Certificate (Issued by a Certificate Authority).........................................................64
Installing an Intermediate Certificate (Issued by a Certificate Authority)................................................65
If the Fax Number Cannot be Obtained....................................................................................................66
LDAP Authentication.........................................................................................................................................67
Specifying LDAP Authentication.................................................................................................................68
Integration Server Authentication....................................................................................................................75
Specifying Integration Server Authentication............................................................................................75
Printer Job Authentication................................................................................................................................82
If User Authentication is Specified..................................................................................................................85
If User Code Authentication is Specified....................................................................................................85
If Basic, Windows, LDAP or Integration Server Authentication is Specified...........................................86
Logging in Using Web Image Monitor......................................................................................................89
Logging out Using Web Image Monitor....................................................................................................89
User Lockout Function..................................................................................................................................89
Auto Logout..................................................................................................................................................92
Authentication Using an External Device.......................................................................................................94
2