TABLE OF CONTENTS
Functions That Require Options......................................................................................................................... 8
Main Software Names.......................................................................................................................................9
1. Getting Started
Before Configuring the Security Function Settings.........................................................................................11
Before Using This Printer.................................................................................................................................. 12
Administrators and Users.................................................................................................................................15
Administrators...................................................................................................................................................16
Configuring Administrator Authentication...................................................................................................... 17
Specifying Administrator Privileges............................................................................................................ 18
Registering and Changing Administrators................................................................................................. 19
Administrator Login Method............................................................................................................................23
Logging in Using the Control Panel............................................................................................................ 23
Logging in Using Web Image Monitor...................................................................................................... 24
Administrator Logout Method..........................................................................................................................25
Logging out Using the Control Panel..........................................................................................................25
Logging out Using Web Image Monitor....................................................................................................25
Supervisor......................................................................................................................................................... 26
Reconfigure the Administrator's Password.................................................................................................26
Changing the Supervisor.............................................................................................................................27
2. Configuring User Authentication
Users..................................................................................................................................................................29
About User Authentication...............................................................................................................................30
Configuring User Authentication.....................................................................................................................31
User Code Authentication............................................................................................................................... 34
Basic Authentication.........................................................................................................................................36
Specifying Basic Authentication..................................................................................................................36
Authentication Information Stored in the Address Book........................................................................... 37
Specifying Login User Names and Passwords..........................................................................................38
Windows Authentication................................................................................................................................. 40
Specifying Windows Authentication.......................................................................................................... 41
Installing Internet Information Services (IIS) and Certificate Services......................................................45
Creating the Server Certificate................................................................................................................... 47
LDAP Authentication.........................................................................................................................................48
1