iii
TABLE OF CONTENTS
Manuals for This Machine ......................................................................................i
How to Read This Manual ..................................................................................... 1
Symbols .....................................................................................................................1
1. Getting Started
Enhanced Security................................................................................................. 3
Glossary .....................................................................................................................4
Setting Up the Machine..............................................................................................5
Security Measures Provided by this Machine..................................................... 7
Using Authentication and Managing Users ................................................................7
Preventing Information Leaks .................................................................................... 7
Limiting and Controlling Access .................................................................................9
Enhanced Network Security.....................................................................................10
2. Authentication and its Application
Administrators and Users ................................................................................... 11
Administrators .......................................................................................................... 11
User.......................................................................................................................... 12
The Management Function .................................................................................13
About Administrator Authentication.......................................................................... 14
About User Authentication .......................................................................................15
Enabling Authentication......................................................................................16
Authentication Setting Procedure.............................................................................16
Administrator Authentication .............................................................................17
Specifying Administrator Privileges..........................................................................17
Registering the Administrator...................................................................................20
Logging on Using Administrator Authentication .......................................................24
Logging off Using Administrator Authentication .......................................................26
Changing the Administrator......................................................................................27
User Authentication.............................................................................................29
User Code Authentication ........................................................................................29
Basic Authentication.................................................................................................33
Windows Authentication...........................................................................................42
LDAP Authentication ................................................................................................50
Integration Server Authentication.............................................................................56
If User Authentication is Specified.....................................................................65
User Code Authentication (Using the Control Panel)...............................................65
User Code Authentication (Using a Printer Driver) ..................................................65
Login (Using the Control Panel)...............................................................................66
Log Off (Using the Control Panel)............................................................................67
Login (Using a Printer Driver)...................................................................................68
Login (Using Web Image Monitor) ...........................................................................68
Log Off (Using Web Image Monitor) ........................................................................68
Auto Logout..............................................................................................................69
Authentication using an external device...................................................................70
BelliniC3-EN_Sec_F_FM_forPaper.book Page iii Friday, December 16, 2005 9:16 AM