Table of Contents
9
Preparations .................................................................................................................................401
System Requirements for the Machine ................................................................................................................401
Installation Procedure ..............................................................................................................402
Installation Overview ...................................................................................................................................................402
Step 1 Fax Settings .......................................................................................................................................................402
Step 2 Setting the Server Fax Feature ..................................................................................................................403
13 Encryption and Digital Signature Settings ...............................405
Encryption and Digital Signature Overview......................................................................406
Types of Certificate.......................................................................................................................................................406
Certificate Conditions ..................................................................................................................................................407
Encryption Features for Communication.............................................................................................................408
Encryption and Digital-Signature Features for Scan Files.............................................................................409
Configuration of HTTP Communications Encryption ....................................................410
Installation Overview ...................................................................................................................................................410
Step1 Configuration on the Machine....................................................................................................................410
Step2 Configuration on the Computer.................................................................................................................412
Configuration of Encryption using IPsec............................................................................413
Installation Overview ...................................................................................................................................................413
Step1 Import and Configuration of a Certificate.............................................................................................413
Step2 Configuration on the Machine (Configuration of IPsec)..................................................................414
Step3 Configuration on the Computer.................................................................................................................415
Configuration of E-mail Encryption/Digital Signature..................................................416
Installation Overview ...................................................................................................................................................416
Step1 Configuration on the Machine....................................................................................................................417
Step2 Configuration on Sender and Recipient..................................................................................................417
Configuration of PDF/DocuWorks/XPS Signature ..........................................................420
Installation Overview ...................................................................................................................................................420
Step1 Configuration on the Machine....................................................................................................................420
Step2 Configuration on the Computer.................................................................................................................422
14 Authentication and Accounting Features.................................423
Overview of Authentication and Accounting Feature...................................................424
Types of User...................................................................................................................................................................424
User Roles and Authorization Groups....................................................................................................................424
Access Control .................................................................................................................................................................426
Types of Authentication .............................................................................................................................................426
Account Administration ..............................................................................................................................................428
Services Controlled by Authentication................................................................................432
Overview............................................................................................................................................................................432
Combination of Authentication and Account Administration types........................................................432
Authentication for Job Flow Sheets and Folders ............................................................435
Creating / Using Job Flow Sheet..............................................................................................................................435
Creating / Using Folder................................................................................................................................................437
Configuration for Authentication.........................................................................................439