EasyManua.ls Logo

Fuji Xerox DocuCentre-IV 4070

Fuji Xerox DocuCentre-IV 4070
675 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
10
Installation Overview............................................................................................354
Step1 Configuration on the Machine ...................................................................354
Step2 Configuration on the Computer .................................................................355
Configuration of Encryption using IPSec..................................................................356
Installation Overview............................................................................................356
Step1 Import and Configuration of a Certificate...................................................356
Step2 Configuration on the Machine (Configuration of IPSec) ............................357
Step3 Configuration on the Computer .................................................................358
Configuration of E-mail Encryption/Digital Signature ...............................................359
Installation Overview............................................................................................359
Step1 Configuration on the Machine ...................................................................359
Step2 Configuration on Sender and Recipient ....................................................361
Configuration of PDF/DocuWorks/XPS Signature (ApeosPort Series Models
Only).........................................................................................................................364
Installation Overview............................................................................................364
Step1 Configuration on the Machine ...................................................................364
Step2 Configuration on the Computer .................................................................366
14 Authentication and Accounting Features ............................................................367
Overview of Authentication and Accounting Feature ...............................................368
Overview of Authentication Feature.....................................................................368
Overview of Accounting Feature..........................................................................369
Authentication...........................................................................................................370
User Types Managed by Authentication Feature ................................................370
User Roles and Authorization Groups .................................................................371
Types of Authentication .......................................................................................372
Types of Account Administration .........................................................................373
Authentication and Accounting Relationship .......................................................374
Services Controlled by Authentication......................................................................375
Overview..............................................................................................................375
Services Restricted by User ID Authentication ....................................................375
Services Restricted by the Combined Use of Smart Card Authentication and
User ID Authentication.........................................................................................378
Authentication for Job Flow Sheets and Folders......................................................381
Overview..............................................................................................................381
When the Authentication Feature is Disabled......................................................383
When the Authentication Feature is Enabled ......................................................386
Jobs Manageable by Account Administration ..........................................................389
Configuration for Authentication ...............................................................................392
Installation Overview............................................................................................392
Enabling Authentication .......................................................................................392
Changing the Default Authorization Group Settings ............................................395
Creating an Authorization Group .........................................................................396
Configuration for IC Card Reader (Optional)............................................................397
Step 1 Preparations .............................................................................................397

Table of Contents

Related product manuals