Configuring User Authentication.....................................................................................................................29
Enabling User Authentication..........................................................................................................................30
User Code Authentication...............................................................................................................................31
Specifying User Code Authentication........................................................................................................31
Basic Authentication.........................................................................................................................................33
Specifying Basic Authentication..................................................................................................................33
Authentication Information Stored in the Address Book...........................................................................34
Specifying Login User Name and Login Password...................................................................................35
Windows Authentication.................................................................................................................................36
Specifying Windows Authentication..........................................................................................................37
LDAP Authentication.........................................................................................................................................43
Specifying LDAP Authentication.................................................................................................................44
Integration Server Authentication....................................................................................................................47
Specifying Integration Server Authentication............................................................................................47
Printer Job Authentication................................................................................................................................50
User Lockout Function......................................................................................................................................52
Specifying the user lockout function...........................................................................................................53
Unlocking a locked user account...............................................................................................................53
Auto Logout Function.......................................................................................................................................55
Authentication Using an External Device.......................................................................................................56
4. Protecting Data from Information Leaks
Printing a Confidential Document...................................................................................................................57
Specifying a Locked Print File.....................................................................................................................57
Printing a Locked Print File...........................................................................................................................58
Deleting Locked Print Files...........................................................................................................................58
Changing Passwords of Locked Print Files.................................................................................................59
Unlocking Locked Print Files........................................................................................................................59
5. Securing Information Stored on the Hard Disk
Protecting the Address Book...........................................................................................................................61
Address Book Access Permission................................................................................................................61
Encrypting Data in the Address Book.........................................................................................................62
Encrypting Data on the Hard Disk..................................................................................................................63
Enabling the Encryption Settings.................................................................................................................63
2