Ricoh PRO C900 Operating Instructions Manual page 6

Security reference
Hide thumbs Also See for PRO C900:
Table of Contents

Advertisement

Basic Authentication.........................................................................................................................................43
Specifying Basic Authentication..................................................................................................................43
Authentication Information Stored in the Address Book...........................................................................45
Windows Authentication.................................................................................................................................49
Specifying Windows Authentication..........................................................................................................50
LDAP Authentication.........................................................................................................................................56
Specifying LDAP Authentication.................................................................................................................57
Integration Server Authentication....................................................................................................................62
Specifying Integration Server Authentication............................................................................................62
If User Authentication is Specified..................................................................................................................69
Login (Using the Control Panel)..................................................................................................................69
Log Off (Using the Control Panel)..............................................................................................................71
Login (Using Web Image Monitor)............................................................................................................72
Log Off (Using Web Image Monitor).........................................................................................................72
Auto Logout..................................................................................................................................................72
Authentication Using an External Device.......................................................................................................76
Protecting the Address Book...........................................................................................................................77
Address Book Access Permission................................................................................................................77
Encrypting Data in the Address Book.........................................................................................................80
Deleting Data on the Hard Disk......................................................................................................................84
Auto Erase Memory.....................................................................................................................................84
Erase All Memory........................................................................................................................................88
Preventing Modification of Machine Settings................................................................................................91
Limiting Available Functions............................................................................................................................92
Specifying Which Functions are Available................................................................................................92
Preventing Unauthorized Access....................................................................................................................97
Access Control.............................................................................................................................................97
Enabling/Disabling Protocols.....................................................................................................................98
Specifying Network Security Level..........................................................................................................104
Protection Using Encryption..........................................................................................................................108
4

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents