User GuideIM 350/430 series

Configuring User Authentication

There are 4 types of user authentication methods: User Code authentication, Basic authentication, Windows authentication, and LDAP authentication. To use user authentication, select an authentication method on the control panel, and then make the required settings for the authentication. The settings depend on the authentication method. Specify administrator authentication, and then specify user authentication.

Important

  • If user authentication cannot be enabled because of a problem with the hard disk or network, you can use the machine by accessing it using administrator authentication and disabling user authentication. Do this if, for instance, you need to use the machine urgently.

  • You cannot use more than one authentication method at the same time.

User authentication configuration flow

Configuration procedure

Details

Configuring administrator authentication

Specifying Administrator Privileges

Registering and Changing Administrators

Configuring user authentication

Specify user authentication.

4 types of user authentication are available:

User authentication methods

Type

Details

User Code authentication

Authentication is performed using eight-digit user codes. Authentication is applied to each user code, not to each user.

It is necessary to register the user code in the machine's Address Book in advance.

Basic authentication

Authentication is performed using the machine's Address Book.

It is necessary to register users in the machine's Address Book in advance.

Authentication can be applied to each user.

Windows authentication

Authentication is performed using the domain controller of the Windows server on the same network as the machine.

Authentication can be applied to each user.

LDAP authentication

Authentication is performed using the LDAP server on the same network as the machine.

Authentication can be applied to each user.

A user's e-mail address obtained via Windows or LDAP authentication can be used as the sender's fixed address ("From") when you send e-mails in the scanner mode or when you forward received faxes in order to prevent ID fraud.

If the user authentication method is switched halfway

  • A user code account that has no more than 8 digits and is used for User Code authentication can be carried over and used as a login user name even after the authentication method has switched from User Code authentication to Basic authentication, Windows authentication, or LDAP authentication. In this case, since no password is provided for the User Code authentication, the login password is set as blank.

  • When authentication switches to an external authentication method (Windows authentication or LDAP authentication), authentication cannot be enabled unless the external authentication device has the carried over user code account previously registered. However, the user code account will be stored in the machine's Address Book even if an authentication failure occurs.

  • From a security perspective, when switching from User Code authentication to another authentication method, we recommend that you delete accounts you do not use or set up a login password. For details about deleting accounts, see "Changing or Deleting a User Code", For First-time Users. For details about changing passwords, see Specifying Login User Names and Passwords.

Note

  • After the main power turns on, extended features may not appear in the list of user authentication items in the User Authentication Management screen. If this happens, wait a while, and then open the User Authentication Management screen again.

  • User authentication can also be specified using a web browser from networked computers. (We use Web Image Monitor installed on this machine.) For details, see Web Image Monitor Help.