
iv
Protection Using Encryption ..............................................................................40
SSL (Secure Sockets Layer) Encryption..................................................................41
User Settings for SSL (Secure Sockets Layer) ........................................................44
Setting the SSL / TLS Encryption Mode...................................................................45
SNMPv3 Encryption .................................................................................................47
5. Management Based on Authentication and Access Control
The Management Function .................................................................................49
Administrators and Users ...................................................................................50
Administrator ............................................................................................................50
User..........................................................................................................................51
Enabling Authentication......................................................................................52
Administrator Authentication ....................................................................................52
User Authentication.................................................................................................. 53
Authentication Information Stored in the Address Book................................. 61
Specifying Authentication Information to Log on......................................................61
If User Authentication Has Been Specified .......................................................63
User Code Authentication (Using the Control Panel)...............................................63
User Code Authentication (Using a Printer Driver) ..................................................63
Login (Using the Control Panel) ...............................................................................63
Log Off (Using the Control Panel) ............................................................................64
Login (Using a Printer Driver)...................................................................................64
Login (Using Web Image Monitor) ...........................................................................64
Log Off (Using Web Image Monitor) ........................................................................65
Auto Logout..............................................................................................................65
Menu Protect ........................................................................................................66
Menu Protect............................................................................................................66
6. Specifying the Administrator/Security Functions
The Roles of Administrators...............................................................................69
Administrator Authentication .............................................................................71
Administrator Authentication ....................................................................................72
Registering the Administrator...................................................................................74
Logging on Using Administrator Authentication .......................................................75
Logging off Using Administrator Authentication .......................................................76
Changing the Administrator......................................................................................77
Specifying the Extended Security Functions....................................................78
Changing the Extended Security Functions .............................................................78
Settings ....................................................................................................................79
Limiting Machine Operation to Customers Only ..............................................82
Settings ....................................................................................................................82
7. Troubleshooting
Authentication Does Not Work Properly ...........................................................85
A Message Appears.................................................................................................85
Machine Cannot Be Operated..................................................................................87
MarC25_EN_SecRef_F_FM.book Page iv Monday, August 2, 2004 6:14 PM