3. Configuring User Authentication
Users..................................................................................................................................................................35
About User Authentication...............................................................................................................................36
Configuring User Authentication.....................................................................................................................37
Enabling User Authentication..........................................................................................................................38
User Code Authentication...............................................................................................................................39
Specifying User Code Authentication........................................................................................................39
Basic Authentication.........................................................................................................................................41
Specifying Basic Authentication..................................................................................................................41
Authentication Information Stored in the Address Book...........................................................................42
Specifying Login User Names and Passwords..........................................................................................42
Specifying Login Details..............................................................................................................................44
Windows Authentication.................................................................................................................................46
Specifying Windows Authentication..........................................................................................................48
Installing Internet Information Services (IIS) and Certificate Services......................................................51
Creating the Server Certificate...................................................................................................................52
Installing the Device Certificate (Issued by a Certificate Authority).........................................................52
LDAP Authentication.........................................................................................................................................54
Specifying LDAP Authentication.................................................................................................................55
Integration Server Authentication....................................................................................................................59
Specifying Integration Server Authentication............................................................................................59
Printer Job Authentication................................................................................................................................64
If User Authentication is Specified..................................................................................................................66
If User Code Authentication is Specified....................................................................................................66
If Basic, Windows, LDAP or Integration Server Authentication is Specified...........................................67
Logging in Using Web Image Monitor......................................................................................................68
Logging out Using Web Image Monitor....................................................................................................68
User Lockout Function..................................................................................................................................68
Auto Logout..................................................................................................................................................71
Authentication Using an External Device.......................................................................................................73
4. Protecting Data from Information Leaks
Configuring Access Permissions for Stored Files............................................................................................75
Specifying User and Access Permissions for Stored Files.........................................................................76
2