Verifying Users to Operate the Machine (User Authentication) | User Guide | IM 7000, IM 8000, IM 9000
https://support.ricoh.com/services/device/ccmanual/IM_7000-8000-9000-re/en-GB/security/int/authentication.htm
User GuideIM 7000/8000/9000
Top Page>Security>Verifying Users to Operate the Machine (User Authentication)
Verifying Users to Operate the Machine (User
Authentication)
"User authentication" is a system to authenticate users and grant them privileges to use the machine. The machine
requires entering an arbitrary text, the login user name, or the login password to authenticate a user.
User authentication prevents unauthorized users from operating the machine and is useful for managing
and analyzing usage of the machine regarding the user, operation time, and frequency.
Confirming the Counter for Each User
You can use the IC card or smart device instead of entering your authentication information on the control
panel for user authentication.
Logging in to the Machine Using an IC Card or a Smart Device
There are four types of user authentication methods including Basic authentication that limits use of the
machine and methods that use an authentication server in the network. Select a method depending on
the usage condition or the number of users. You cannot use more than one authentication method at the
same time.
User Authentication
Method
Explanation
User Code
authentication
Authentication is performed using an eight-digit user code.
When specifying User Code authentication, the machine prompts you
to enter the user code to use the machine.
Multiple users can use the same user code.
You can activate User Code authentication without activating
Administrator Authentication.
User Authentication Method