TABLE OF CONTENTS
Functions That Require Options.........................................................................................................................9
Main Software Names....................................................................................................................................10
1. Getting Started
Before Configuring the Security Function Settings.........................................................................................11
Before Using This Machine..............................................................................................................................12
Administrators and Users.................................................................................................................................14
Administrators...................................................................................................................................................15
Configuring Administrator Authentication......................................................................................................16
Specifying Administrator Privileges............................................................................................................17
Registering and Changing Administrators.................................................................................................19
Using Web Image Monitor to Configure Administrator Authentication..................................................22
Administrator Login Method............................................................................................................................23
Logging in Using the Control Panel............................................................................................................23
Logging in Using Web Image Monitor......................................................................................................24
Administrator Logout Method..........................................................................................................................25
Logging out Using the Control Panel..........................................................................................................25
Logging out Using Web Image Monitor....................................................................................................25
Supervisor.........................................................................................................................................................26
Resetting the Administrator's Password......................................................................................................26
Changing the Supervisor.............................................................................................................................27
2. Configuring User Authentication
Users..................................................................................................................................................................29
About User Authentication...............................................................................................................................30
Configuring User Authentication.....................................................................................................................31
User Code Authentication...............................................................................................................................34
Basic Authentication.........................................................................................................................................37
Specifying Basic Authentication..................................................................................................................37
Authentication Information Stored in the Address Book...........................................................................39
Specifying Login User Names and Passwords..........................................................................................40
Specifying Login Details..............................................................................................................................41
Windows Authentication.................................................................................................................................43
Specifying Windows Authentication..........................................................................................................45
Installing Internet Information Services (IIS) and Certificate Services......................................................49
1