Table of Contents
7
Step2 Configuration on a Computer ................................................................... 317
Configuration of Encryption using IPSec ................................................................. 318
Installation Overview........................................................................................... 318
Step1 Import and Configuration of a Certificate.................................................. 318
Step2 Configuration on the Machine (Configuration of IPSec) ........................... 319
Step3 Configuration on a Computer ................................................................... 320
Configuration of E-mail Encryption/Digital Signature............................................... 321
Installation Overview........................................................................................... 321
Step1 Configuration on the Machine................................................................... 321
Step2 Configuration on a Computer ................................................................... 323
Configuration of PDF/DocuWorks/XPS Signature (ApeosPort Series Models Only)325
Installation Overview........................................................................................... 325
Step1 Configuration on the Machine................................................................... 325
Step2 Configuration on a Computer ................................................................... 327
13 Authentication and Account Administration ...................................................... 329
Overview of Authentication and Account Administration ......................................... 330
Overview of Authentication ................................................................................. 330
Overview of Account Administration ................................................................... 331
Authentication.......................................................................................................... 332
Users Controlled by Authentication..................................................................... 332
User Role and Authorization Groups .................................................................. 332
Types of Authentication ...................................................................................... 333
Types of Account Administration ........................................................................ 334
Relationships Between the Authentication and Accounting Modes .................... 335
Services Controlled by Authentication..................................................................... 336
Overview ............................................................................................................. 336
Services Controlled by Authentication and Account Administration ................... 336
Authentication for Job Flow Sheets and Mailboxes................................................. 339
Overview ............................................................................................................. 339
When the Authentication Feature is not Enabled................................................ 341
When the Authentication Feature is Enabled...................................................... 343
Jobs Manageable by Account Administration.......................................................... 346
Configuration for Authentication .............................................................................. 349
Installation Overview........................................................................................... 349
Step 1 Enabling Authentication........................................................................... 349
Step 2 Changing the Default Authorization Group Settings................................ 351
Step 3 Creating an Authorization Group ............................................................. 351
Configuration for Account Administration ................................................................ 353
Step 1 Selecting an Accounting Type ................................................................. 353
Step 2 Registering User Information................................................................... 353
14 Problem Solving .................................................................................................... 355
Troubleshooting....................................................................................................... 356