2. Configuring Administrator
Authentication
This chapter describes what an administrator can do, how to register an administrator, how to specify
administrator authentication, and how to log in to and out from the machine as an administrator.
Administrators
Administrators manage user access to the machine and various other important functions and settings.
When an administrator controls limited access and settings, first select the machine's administrator and
enable the authentication function before using the machine. When the authentication function is
enabled, the login user name and login password are required in order to use the machine. The roles of
user administrator, machine administrator, network administrator, and file administrator can be assigned
to separate administrators. Sharing administrator tasks eases the burden on individual administrators
while also reducing the possibility of unauthorized access and operations. Multiple administrator roles
can be assigned to one administrator, and one role can also be shared by more than one administrator.
You can also specify a supervisor who can change each administrator's password. Administrators
cannot use functions such as copying and printing. To use these functions, the administrator must be
authenticated as the user.
For instructions on registering the administrator, see "Registering the Administrator", and for instructions
on changing the administrator's password, see "Supervisor Operations". For details on Users, see
"Users".
• If user authentication is not possible because of a problem with the hard disk or network, you can
use the machine by accessing it using administrator authentication and disabling user
authentication. Do this if, for instance, you need to use the machine urgently.
• p.32 "Registering the Administrator"
• p.301 "Supervisor Operations"
• p.39 "Users"
User Administrator
This is the administrator who manages personal information in the Address Book.
A user administrator can register/delete users in the Address Book or change users' personal
information.
Users registered in the Address Book can also change and delete their own information.
25