• From a security perspective, when switching from User Code authentication to another
authentication method, we recommend that you delete accounts you are not going to use, or
set up a login password. For details about deleting accounts, see "Deleting a Registered
Name", Connecting the Machine/ System Settings. For details about changing passwords,
see page 40 "Specifying Login User Names and Passwords".
• After turning the main power on, extended features may not appear in the list of user authentication
items in the User Authentication Management menu. If this happens, wait a while and then open the
User Authentication Management menu again.
• User authentication can also be specified via Web Image Monitor. For details, see Web Image
Monitor Help.
Configuring User Authentication
33