There are 5 types of user authentication methods: User Code authentication, Basic authentication, Windows authentication, LDAP authentication, and Integration Server authentication. To use user authentication, select an authentication method on the control panel, and then make the required settings for the authentication. The settings depend on the authentication method. Specify administrator authentication, and then specify user authentication.
If user authentication cannot be enabled because of a problem with the hard disk or network, you can use the machine by accessing it using administrator authentication and disabling user authentication. Do this if, for instance, you need to use the machine urgently.
You cannot use more than one authentication method at the same time.
Configuration procedure |
Details |
---|---|
Configuring administrator authentication |
|
Configuring user authentication |
Specify user authentication. 5 types of user authentication are available: |
Type |
Details |
---|---|
User Code authentication |
Authentication is performed using eight-digit user codes. Authentication is applied to each user code, not to each user. It is necessary to register the user code in the machine's Address Book in advance. |
Basic authentication |
Authentication is performed using the machine's Address Book. It is necessary to register users in the machine's Address Book in advance. Authentication can be applied to each user. |
Windows authentication |
Authentication is performed using the domain controller of the Windows server on the same network as the machine. Authentication can be applied to each user. |
LDAP authentication |
Authentication is performed using the LDAP server on the same network as the machine. Authentication can be applied to each user. |
Integration Server authentication |
Authentication is performed using an external authentication server on the same network as the machine. This establishes an environment in which authentication is applied collectively to users of devices (such as MFPs and computers) over the network. Authentication can be applied to each user. To create an external authentication server, software including Authentication Manager (e.g., Remote Communication Gate S) is required. |
A user's e-mail address obtained via Windows, LDAP, or Integration Server authentication can be used as the sender's fixed address ("From") when you send e-mails in the scanner mode or when you forward received faxes in order to prevent ID fraud.
If the user authentication method is switched halfway
A user code account that has no more than 8 digits and is used for User Code authentication can be carried over and used as a login user name even after the authentication method has switched from User Code authentication to Basic authentication, Windows authentication, LDAP authentication, or Integration Server authentication. In this case, since no password is provided for the User Code authentication, the login password is set as blank.
When authentication switches to an external authentication method (Windows authentication, LDAP authentication, or Integration Server authentication), authentication cannot be enabled unless the external authentication device has the carried over user code account previously registered. However, the user code account will be stored in the machine's Address Book even if an authentication failure occurs.
From a security perspective, when switching from User Code authentication to another authentication method, we recommend that you delete accounts you do not use or set up a login password. For details about deleting accounts, see "Deleting a Registered Name", Connecting the Machine/System Settings. For details about changing passwords, seeSpecifying Login User Names and Passwords.
After the main power turns on, extended features may not appear in the list of user authentication items in the User Authentication Management menu. If this happens, wait a while, and then open the User Authentication Management menu again.
User authentication can also be specified via Web Image Monitor. For details, see Web Image Monitor Help.