EasyManua.ls Logo

Fuji Xerox ApeosPort 450 I

Fuji Xerox ApeosPort 450 I
609 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
14 Authentication and Auditron Administration
406
Authentication and Auditron Administration
14
Overview of Authentication
This section is an overview of the Authentication feature used with the machine.
Users Controlled by Authentication
The following is an explanation about the different user types that are controlled by the
Authentication feature.
Users are classified into the following four types. The Authentication feature restricts
operations according to the user type.
z
System administrator
z
Authenticated user
z
Unauthenticated user
z
General users
System Administrator
These are users who can enter and change system settings.
A system administrator uses a special user ID called a system administrator ID.
To enter the System Administration mode, enter the system administrator ID into the
user ID entry field on the authentication screen.
Authenticated User
These are users who are registered with the machine.
When an authenticated user uses a service that is restricted, the user must enter the
user ID on the authentication screen.
Unauthenticated User
These are users who are not registered with the machine.
An unauthenticated user cannot use services that are restricted.
General Users
These are users who are not permitted to use the machine in the authenticated mode.
Types of Authentication
The following describes the types of authentication method that can be used with the
machine.
Authentication is carried out using an user ID registered on the machine or on a remote
authentication server.
The following three types of authentication are used by the machine depending on
where user information is stored.
Local machine authentication
Local machine authentication uses the user information stored in the machine to
manage authentication.

Table of Contents

Related product manuals