Skip header
 

Authentication Information Stored in the Address Book

If you have enabled user authentication, you can specify access limits and usage limits to the machine's functions for each user or group of users. Specify the necessary settings in the Address Book entry of each user. For details about the functions that can be limited, see Limiting Available Functions.

Users must have a registered account in the Address Book in order to use the machine when user authentication is specified. For details about user registration in the Address Book, see "Registering User Information", Connecting the Machine/System Settings.

User authentication can also be specified via Web Image Monitor. For details, see Web Image Monitor Help.