9
Preparations ......................................................................................................................................................362
System Requirements for the Machine............................................................................................362
Installation Procedure ...................................................................................................................................363
Installation Overview...............................................................................................................................363
Step 1 Fax Settings...................................................................................................................................363
Step 2 Setting the Server Fax Feature..............................................................................................364
13 Encryption and Digital Signature Settings .................................................................................367
Encryption and Digital Signature Overview..........................................................................................368
Types of Certificate..................................................................................................................................368
Encryption Features for Communication........................................................................................368
Encryption and Digital-Signature Features for Scan Files........................................................369
Configuration of HTTP Communications Encryption.......................................................................370
Installation Overview...............................................................................................................................370
Step1 Configuration on the Machine ...............................................................................................370
Step2 Configuration on the Computer.............................................................................................371
Configuration of Encryption using IPsec ...............................................................................................372
Installation Overview...............................................................................................................................372
Step1 Import and Configuration of a Certificate........................................................................372
Step2 Configuration on the Machine (Configuration of IPsec).............................................373
Step3 Configuration on the Computer.............................................................................................374
Configuration of E-mail Encryption/Digital Signature.....................................................................375
Installation Overview...............................................................................................................................375
Step1 Configuration on the Machine ...............................................................................................375
Step2 Configuration on Sender and Recipient .............................................................................377
Configuration of PDF/DocuWorks/XPS Signature (ApeosPort Series Models Only).............379
Installation Overview...............................................................................................................................379
Step1 Configuration on the Machine ...............................................................................................379
Step2 Configuration on the Computer.............................................................................................381
14 Authentication and Accounting Features...................................................................................383
Overview of Authentication and Accounting Feature......................................................................384
Types of User..............................................................................................................................................384
User Roles and Authorization Groups...............................................................................................384
Access Control ............................................................................................................................................385
Types of Authentication.........................................................................................................................386
Types of Account Administration.......................................................................................................387
Services Controlled by Authentication....................................................................................................392
Overview .......................................................................................................................................................392
Combination of Authentication and Account Administration types...................................392
Authentication for Job Flow Sheets and Folders................................................................................395
Creating / Using Job Flow Sheet.........................................................................................................395
Creating / Using Folder...........................................................................................................................396
Configuration for Authentication.............................................................................................................398
Installation Overview...............................................................................................................................398
Enabling Authentication ........................................................................................................................398
Changing the Default Authorization Group Settings.................................................................401
Creating an Authorization Group.......................................................................................................401