Web Image Monitor: Address Book
These settings are in [Device Management].
When administrator authentication is activated, the restrictions to user operations differ depending on the available settings for each administrator.
Settings |
User |
Mach |
N/W |
File |
Unset |
Set |
|---|---|---|---|---|---|---|
|
[Add User] |
R/W |
– |
– |
– |
R/W *1 |
R/W *1 |
|
[Change] |
R/W |
– |
– |
– |
R/W *1 |
R/W *1 |
|
[Delete] |
R/W |
– |
– |
– |
R/W *1 |
R/W *1 |
|
[Add Group] |
R/W |
– |
– |
– |
R/W *1 |
R/W *1 |
|
[Data Carry-over Setting for Address Book Auto-program] |
R/W |
– |
– |
– |
R/W |
R |
|
[Maintenance] |
R/W |
– |
– |
– |
– |
– |
|
[Central Management] |
R/W |
– |
– |
– |
– |
– |
*1 If you set the machine as follows, each user can only change the password for his or her account when basic authentication is activated.
Settings screen type: Standard
[Security]
[Extended Security Settings]
[Restrict Adding of User Destinations (Fax)] or [Restrict Adding of User Destinations (Scanner)]
[On]Settings screen type: Classic
[Extended Security]
[Restrict Adding of User Destinations (Fax)] or [Restrict Adding of User Destinations (Scanner)]
[On]