Changing the Administrator........................................................................................................................32
Using Web Image Monitor.........................................................................................................................34
3. Users/Authentication and Its Application
Users..................................................................................................................................................................35
About User Authentication...............................................................................................................................36
Authentication Setting Procedure....................................................................................................................37
Enabling User Authentication..........................................................................................................................39
User Code Authentication...............................................................................................................................40
Specifying User Code Authentication........................................................................................................40
Basic Authentication.........................................................................................................................................46
Specifying Basic Authentication..................................................................................................................46
Authentication Information Stored in the Address Book...........................................................................51
Specifying Login User Name and Login Password...................................................................................51
Specifying Authentication Information to Log on......................................................................................54
Windows Authentication.................................................................................................................................58
Specifying Windows Authentication..........................................................................................................59
LDAP Authentication.........................................................................................................................................69
Specifying LDAP Authentication.................................................................................................................70
Integration Server Authentication....................................................................................................................78
Specifying Integration Server Authentication............................................................................................78
Printer Job Authentication................................................................................................................................87
If User Authentication is Specified..................................................................................................................89
User Code Authentication (Using the Control Panel)................................................................................89
User Code Authentication (Using a Printer Driver)....................................................................................89
Login (Using the Control Panel)..................................................................................................................90
Log Off (Using the Control Panel)..............................................................................................................90
Login (Using a Printer Driver)......................................................................................................................91
Login (Using Web Image Monitor)............................................................................................................91
Log Off (Using Web Image Monitor).........................................................................................................91
User Lockout Function..................................................................................................................................91
Auto Logout..................................................................................................................................................94
Authentication Using an External Device.......................................................................................................96
4