Specifying User Code Authentication........................................................................................................45
Basic Authentication.........................................................................................................................................50
Specifying Basic Authentication..................................................................................................................50
Authentication Information Stored in the Address Book...........................................................................54
Windows Authentication.................................................................................................................................61
Specifying Windows Authentication..........................................................................................................62
LDAP Authentication.........................................................................................................................................74
Specifying LDAP Authentication.................................................................................................................75
Integration Server Authentication....................................................................................................................85
Specifying Integration Server Authentication............................................................................................85
Printer Job Authentication................................................................................................................................94
If User Authentication is Specified..................................................................................................................97
User Code Authentication (Using the Control Panel)................................................................................97
User Code Authentication (Using a Printer Driver)....................................................................................98
Login (Using the Control Panel)..................................................................................................................98
Log Off (Using the Control Panel)..............................................................................................................99
Login (Using a Printer Driver)....................................................................................................................100
Login (Using Web Image Monitor)..........................................................................................................101
Log Off (Using Web Image Monitor)......................................................................................................101
User Lockout Function...............................................................................................................................101
Auto Logout................................................................................................................................................103
Authentication Using an External Device.....................................................................................................107
3. Ensuring Information Security
Printing a Confidential Document.................................................................................................................109
Specifying a Locked Print File...................................................................................................................109
Printing a Locked Print File........................................................................................................................110
Deleting Locked Print Files........................................................................................................................111
Changing Passwords of Locked Print Files..............................................................................................113
Unlocking Locked Print Files.....................................................................................................................115
Specifying Access Permission for Stored Files.............................................................................................117
Assigning Users and Access Permission for Stored Files........................................................................118
Specifying Access Privileges for Files Stored using the Scanner Function............................................120
Assigning the User and the Access Permission for the User's Stored Files............................................124
4