
iii
TABLE OF CONTENTS
Manuals for This Machine ......................................................................................i
How to Read This Manual ..................................................................................... 1
Symbols .....................................................................................................................1
Display .......................................................................................................................2
1. Getting Started
Enhanced Security.................................................................................................3
Glossary .....................................................................................................................4
Setting Up the Machine..............................................................................................5
Using Web Image Monitor..........................................................................................6
Security Measures Provided by this Machine..................................................... 7
Using Authentication and Managing Users ................................................................7
Preventing Information Leaks ....................................................................................8
Limiting and Controlling Access .................................................................................9
Enhanced Network Security.....................................................................................10
2. Authentication and its Application
Administrators and Users ...................................................................................11
Administrators .......................................................................................................... 12
User..........................................................................................................................13
The Management Function .................................................................................14
About Administrator Authentication..........................................................................15
About User Authentication .......................................................................................16
Enabling Authentication......................................................................................17
Authentication Setting Procedure.............................................................................17
Administrator Authentication .............................................................................18
Specifying Administrator Privileges..........................................................................19
Registering the Administrator...................................................................................21
Logging on Using Administrator Authentication .......................................................25
Logging off Using Administrator Authentication .......................................................26
Changing the Administrator......................................................................................26
User Authentication.............................................................................................29
User Code Authentication ........................................................................................29
Basic Authentication.................................................................................................34
Windows Authentication...........................................................................................45
LDAP Authentication ................................................................................................55
Integration Server Authentication.............................................................................63
If User Authentication Has Been Specified .......................................................72
User Code Authentication (Using the Control Panel)...............................................72
User Code Authentication (Using a Printer Driver) ..................................................73
Login (Using the Control Panel)...............................................................................73
Log Off (Using the Control Panel)............................................................................73
Login (Using a Printer Driver)...................................................................................74
Login (Using Web Image Monitor) ...........................................................................74
Log Off (Using Web Image Monitor) ........................................................................74
Auto Logout..............................................................................................................75
Authentication using an external device...................................................................76
C2847609_StellaC3-AE.book Page iii Monday, August 14, 2006 5:46 PM