User Authentication
There are five types of user authentication method: user code authentication, ba-
sic authentication, Windows authentication, Integration Server Authentication,
and LDAP authentication. To use user authentication, select an authentication
method on the control panel, and then make the required settings for the authen-
tication. The settings depend on the authentication method.
Note
❒ User code authentication is used for authenticating on the basis of the user
code, and basic authentication, Windows authentication, LDAP authentica-
tion, and Integration Server Authentication are used for authenticating indi-
vidual users.
❒ The user code account, that has no more than eight digits and is used for User
Code authentication, can be carried over and used as a login user name even
after the authentication method has switched from User Code authentication
to BASIC authentication, Windows authentication, LDAP authentication, or
Integration Server authentication. In this case, since the User Code authenti-
cation does not have a password, the login password is set as a blank account.
When the authentication method switches to an external authentication (Win-
dows authentication, LDAP authentication, or Integration Server authentica-
tion), authentication will not occur, unless the external authentication device
has previously registered the carried over user code account. However, the
user code account will remain in the Address Book of the machine in spite of
the authentication failure. From a security perspective, when switching from
User Code authentication to another authentication method, we recommend
that you delete accounts you are not going to use, or set up a login password.
For details about deleting accounts, see General Settings Guide. For details
about changing passwords, see p.42 "Specifying Login User Name and Login
Password".
❒ You cannot use more than one authentication method at the same time.
❒ User authentication can also be specified via Web Image Monitor. For details
see the Web Image Monitor Help.
❒ When enabling "user authentication," all users in the address book can access
and change all the settings on the GL/2 & TIFF screen.
User Authentication
33
2