10
Installation Overview............................................................................................354
Step1 Configuration on the Machine ...................................................................354
Step2 Configuration on the Computer .................................................................355
Configuration of Encryption using IPSec..................................................................356
Installation Overview............................................................................................356
Step1 Import and Configuration of a Certificate...................................................356
Step2 Configuration on the Machine (Configuration of IPSec) ............................357
Step3 Configuration on the Computer .................................................................358
Configuration of E-mail Encryption/Digital Signature ...............................................359
Installation Overview............................................................................................359
Step1 Configuration on the Machine ...................................................................359
Step2 Configuration on Sender and Recipient ....................................................361
Configuration of PDF/DocuWorks/XPS Signature (ApeosPort Series Models
Only).........................................................................................................................364
Installation Overview............................................................................................364
Step1 Configuration on the Machine ...................................................................364
Step2 Configuration on the Computer .................................................................366
14 Authentication and Accounting Features ............................................................367
Overview of Authentication and Accounting Feature ...............................................368
Overview of Authentication Feature.....................................................................368
Overview of Accounting Feature..........................................................................369
Authentication...........................................................................................................370
User Types Managed by Authentication Feature ................................................370
User Roles and Authorization Groups .................................................................371
Types of Authentication .......................................................................................372
Types of Account Administration .........................................................................373
Authentication and Accounting Relationship .......................................................374
Services Controlled by Authentication......................................................................375
Overview..............................................................................................................375
Services Restricted by User ID Authentication ....................................................375
Services Restricted by the Combined Use of Smart Card Authentication and
User ID Authentication.........................................................................................378
Authentication for Job Flow Sheets and Folders......................................................381
Overview..............................................................................................................381
When the Authentication Feature is Disabled......................................................383
When the Authentication Feature is Enabled ......................................................386
Jobs Manageable by Account Administration ..........................................................389
Configuration for Authentication ...............................................................................392
Installation Overview............................................................................................392
Enabling Authentication .......................................................................................392
Changing the Default Authorization Group Settings ............................................395
Creating an Authorization Group .........................................................................396
Configuration for IC Card Reader (Optional)............................................................397
Step 1 Preparations .............................................................................................397