EasyManua.ls Logo

Ricoh Pro C900 - Page 6

Ricoh Pro C900
192 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Basic Authentication.........................................................................................................................................43
Specifying Basic Authentication..................................................................................................................43
Authentication Information Stored in the Address Book...........................................................................45
Windows Authentication.................................................................................................................................49
Specifying Windows Authentication..........................................................................................................50
LDAP Authentication.........................................................................................................................................56
Specifying LDAP Authentication.................................................................................................................57
Integration Server Authentication....................................................................................................................62
Specifying Integration Server Authentication............................................................................................62
If User Authentication is Specified..................................................................................................................69
Login (Using the Control Panel)..................................................................................................................69
Log Off (Using the Control Panel)..............................................................................................................71
Login (Using Web Image Monitor)............................................................................................................72
Log Off (Using Web Image Monitor).........................................................................................................72
Auto Logout..................................................................................................................................................72
Authentication Using an External Device.......................................................................................................76
3. Ensuring Information Security
Protecting the Address Book...........................................................................................................................77
Address Book Access Permission................................................................................................................77
Encrypting Data in the Address Book.........................................................................................................80
Deleting Data on the Hard Disk......................................................................................................................84
Auto Erase Memory.....................................................................................................................................84
Erase All Memory........................................................................................................................................88
4. Managing Access to the Machine
Preventing Modification of Machine Settings................................................................................................91
Limiting Available Functions............................................................................................................................92
Specifying Which Functions are Available................................................................................................92
5. Enhanced Network Security
Preventing Unauthorized Access....................................................................................................................97
Access Control.............................................................................................................................................97
Enabling/Disabling Protocols.....................................................................................................................98
Specifying Network Security Level..........................................................................................................104
Protection Using Encryption..........................................................................................................................108
4

Table of Contents

Other manuals for Ricoh Pro C900

Related product manuals