
Basic Authentication.........................................................................................................................................43
Specifying Basic Authentication..................................................................................................................43
Authentication Information Stored in the Address Book...........................................................................45
Windows Authentication.................................................................................................................................49
Specifying Windows Authentication..........................................................................................................50
LDAP Authentication.........................................................................................................................................56
Specifying LDAP Authentication.................................................................................................................57
Integration Server Authentication....................................................................................................................62
Specifying Integration Server Authentication............................................................................................62
If User Authentication is Specified..................................................................................................................69
Login (Using the Control Panel)..................................................................................................................69
Log Off (Using the Control Panel)..............................................................................................................71
Login (Using Web Image Monitor)............................................................................................................72
Log Off (Using Web Image Monitor).........................................................................................................72
Auto Logout..................................................................................................................................................72
Authentication Using an External Device.......................................................................................................76
3. Ensuring Information Security
Protecting the Address Book...........................................................................................................................77
Address Book Access Permission................................................................................................................77
Encrypting Data in the Address Book.........................................................................................................80
Deleting Data on the Hard Disk......................................................................................................................84
Auto Erase Memory.....................................................................................................................................84
Erase All Memory........................................................................................................................................88
4. Managing Access to the Machine
Preventing Modification of Machine Settings................................................................................................91
Limiting Available Functions............................................................................................................................92
Specifying Which Functions are Available................................................................................................92
5. Enhanced Network Security
Preventing Unauthorized Access....................................................................................................................97
Access Control.............................................................................................................................................97
Enabling/Disabling Protocols.....................................................................................................................98
Specifying Network Security Level..........................................................................................................104
Protection Using Encryption..........................................................................................................................108
4