
Specifying Basic Authentication..................................................................................................................41
Authentication Information Stored in the Address Book...........................................................................43
Specifying Login User Name and Login Password...................................................................................43
Windows Authentication.................................................................................................................................48
Specifying Windows Authentication..........................................................................................................49
LDAP Authentication.........................................................................................................................................54
Specifying LDAP Authentication.................................................................................................................55
If User Authentication is Specified..................................................................................................................58
User Code Authentication (Using the Control Panel)................................................................................58
Login (Using the Control Panel)..................................................................................................................58
Log Off (Using the Control Panel)..............................................................................................................60
Login (Using Web Image Monitor)............................................................................................................61
Log Off (Using Web Image Monitor).........................................................................................................61
User Lockout Function..................................................................................................................................61
Auto Logout..................................................................................................................................................64
3. Ensuring Information Security
Specifying Access Permission for Stored Files...............................................................................................67
Assigning Users and Access Permission for Stored Files..........................................................................67
Specifying Passwords for Stored Files........................................................................................................70
Unlocking Files.............................................................................................................................................71
Protecting the Address Book...........................................................................................................................74
Encrypting Data in the Address Book.........................................................................................................74
Encrypting Data on the Hard Disk..................................................................................................................77
Enabling the Encryption Settings.................................................................................................................77
Printing the Encryption Key.........................................................................................................................80
Updating the Encryption Key......................................................................................................................82
Canceling Data Encryption.........................................................................................................................84
Deleting Data on the Hard Disk......................................................................................................................87
Auto Erase Memory.....................................................................................................................................87
4. Managing Access to the Machine
Preventing Modification of Machine Settings................................................................................................95
Menu Protect.....................................................................................................................................................97
Menu Protect................................................................................................................................................97
4