Canon 08011-41-UD2-003 Installation And Configuration Manual

For imagerunner machines version 4.1
Table of Contents

Advertisement

Canon
Authorized Send

Installation and Configuration

Guide
for imageRUNNER Machines
Version 4.1
08011-41-UD2-003

Advertisement

Table of Contents
loading

Summary of Contents for Canon 08011-41-UD2-003

  • Page 1: Installation And Configuration

    Canon Authorized Send Installation and Configuration Guide for imageRUNNER Machines Version 4.1 08011-41-UD2-003...
  • Page 2 This page is intentionally left blank. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 3: Table Of Contents

    Contents Preface ...7 How to Use This Manual... 7 Symbols Used in This Manual ... 7 Keys and Buttons Used in This Manual ... 8 Displays Used in This Manual... 9 Abbreviations and Terms Used in This Manual ... 10 Hyperlinks ...
  • Page 4 3.15 Configuring Scan Settings ... 108 3.16 Configuring Optional Settings ... 113 3.17 Configuring Log Settings... 117 3.18 Changing the Login ID and Password... 122 3.19 Using the Brand Configuration Tool (Optional) ... 124 Chapter 4 Configuring the MEAP Device...135 Setting DNS Server Settings...
  • Page 5 6.5.2 SCAN TO FAX Input Request Messages... 173 6.5.3 SCAN TO FAX Notification Messages ... 174 6.5.4 SCAN TO FAX Error Messages ... 174 SCAN TO FOLDER Screen Notification Messages ... 175 6.6.1 SCAN TO FOLDER Warning Message ... 175 6.6.2 SCAN TO FOLDER Input Request Messages ...
  • Page 6 This page is intentionally left blank. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 7: Preface

    Preface Thank you for purchasing the Authorized Send software application. Please read this manual thoroughly before operating the product on your MEAP-enabled machine to familiarize yourself with its capabilities, and to make the most of its many functions. After reading this manual, store it in a safe place for future reference.
  • Page 8: Keys And Buttons Used In This Manual

    Keys and Buttons Used in This Manual Keys for using the machine’s main functions are located on the top of the touch panel display. To use any of the desired function’s features, you must first press the key or application tab for the desired function. Press [ applications.
  • Page 9: Displays Used In This Manual

    The following key and button names are a few examples of how keys and buttons to be pressed and clicked are represented in this manual: Touch Panel Display Keys: Examples: Control Panel Keys: Examples: Buttons on Computer Operations Screens: Examples: Displays Used in This Manual Most screen shots used in this manual are those taken when Authorized Send is being installed using MEAP SMS (Service Management Service), or when Authorized Send is...
  • Page 10: Abbreviations And Terms Used In This Manual

    Local Area Network Lightweight Directory Access Protocol LDAP License Management System Multifunctional Embedded Application Platform MEAP Supported Canon imagePRESS, imageRUNNER, or Color imageRUNNER multifunctional machine featuring MEAP device embedded MEAP technology. NT LAN Manager NTLM These characters are from ‘ ’ (space) up to and including ‘~’...
  • Page 11: Legal Notices

    Trademarks Canon, the Canon logo, imageRUNNER, Color imageRUNNER, imagePRESS, and MEAP are registered trademarks, and the MEAP logo is a trademark, of Canon Inc. in the United States and may also be trademarks or registered trademarks in other countries. Windows and .NET Framework are registered trademarks of Microsoft Corporation in the United States and are trademarks or registered trademarks of Microsoft Corporation in other countries.
  • Page 12 This page is intentionally left blank. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 13: Chapter 1 Overview

    Canon imageRUNNER and imagePRESS machines that enables the development of custom applications, which run alongside native functions, such as Copy, Print, and Scan. MEAP, developed by Canon, is based on Sun Microsystems’ Java and Java 2 Micro Edition technology.
  • Page 14 • Authenticate to a separate domain when scanning to a folder. • Provide the ability to use NTLM Authentication for Scan to Folder, regardless of the authentication method used. • Provide the ability to dynamically locate the closet available domain controller within the domain, and cache that domain controller until it becomes no longer available.
  • Page 15: System Requirements

    Please consult the appropriate chapters (including Chapter 5, “Troubleshooting,” 1.1.1 Hardware Requirements Authorized Send is designed to operate on the following Canon MEAP-enabled devices using the minimum specified MEAP Contents version. Device Family imageRUNNER 2270/2870/3570/4570 imageRUNNER 8070/9070/85+/105+...
  • Page 16: Server Requirements

    IMPORTANT • MEAP and Use HTTP settings (from the Additional Functions screen) on the MEAP device must be enabled. (See the Reference Guide or the appropriate e-manual that came with your machine.) • Access to System Manager Settings (from the Additional Functions screen) on the MEAP device is necessary.
  • Page 17: Software Requirements

    1.1.3 Software Requirements Microsoft Internet Explorer 6.0 or later, with JavaScript enabled, must be installed and configured prior to installing the Authorized Send application. KDC is necessary for running Kerberos authentication. 1.1.4 Home Directory Requirements If the System Administrator wants to configure the Retrieve Home Directory (Active Directory only) feature, the following three types of configurations are supported.
  • Page 18 ■ Local Path This configuration illustrates when the home directory exists on the authentication server as a local folder. Home Directory as a Local Path When the home directory exists on the authentication server as a local folder, it is impossible for Authorized Send to use the text as it is.
  • Page 19: Distributed File System Requirements

    1.1.5 Distributed File System Requirements Authorized Send supports the following two DFS (Distributed File System) roots. ■ Stand-alone DFS root ■ Domain-based DFS root Successful domain-based DFS root support for Authorized Send requires that certain configuration settings be implemented and understood. 1.
  • Page 20: Communication Interfaces

    1.1.6 Communication Interfaces The table below shows the different communication interfaces, their specific port numbers, and descriptions used with Authorized Send. Communication Interface NTLM Kerberos LDAP SMTP HTTP HTTPS Syslog Authorized Send Installation and Configuration Guide for imageRUNNER Machines Port Description Determined by AD Used for authentication.
  • Page 21: Supported Authentication Protocols

    MEAP Application Coexistence Support Authorized Send can coexist with other installed MEAP applications that have received verification by Canon U.S.A., Inc., provided that there are sufficient resources available on the MEAP device. The following table shows the maximum values for MEAP resources that Authorized Send could use in a MEAP device.
  • Page 22: Communication Environment

    Communication Environment Authorized Send must be installed on a MEAP-enabled device. There must be network connectivity between the MEAP device, DNS, authentication servers, address book servers, SMTP server, and shared file servers. It is necessary to configure Authorized Send to communicate with the authentication servers and address book servers.
  • Page 23 The following illustrations represent a flow of operations for the Scan to E-Mail, Scan to Fax, and Scan to Folder functions of the Authorized Send application. 1. The user makes an address book query from the Scan to E-Mail function on the MEAP machine.
  • Page 24 1. The user browses for the desired folder on the file server directly from the machine. 2. Once the directory is found and selected, the machine sends the file to the designated location on the file server. NOTE When a user accesses a network share, they are authenticated against that share using their credentials.
  • Page 25 1. The authenticated user selects a folder, enters a document name, and scans the document. 2. The scanned document is automatically stored in a sub-folder (that was dynamically created) of the selected folder. 1. The user tries to log on to the machine using one of the authentication methods. 2.
  • Page 26: Communication Diagrams

    1.2.1 Communication Diagrams This section shows the flow of communication protocols based on the authentication method that you select. You can configure up to 10 authentication servers. 1.2.1.1 Authentication Communication Diagrams Authorized Send Installation and Configuration Guide for imageRUNNER Machines Kerberos Authentication Communication Protocol LDAP/Kerberos NTLM Authentication...
  • Page 27: Address Book Communication Diagrams

    1.2.1.2 Address Book Communication Diagrams Kerberos Communication with an Address Book Server NTLM Communication with an Address Book Server Simple Communication with an Address Book Server Anonymous Bind Communication Using LDAP with an Address Book Server Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 28 This page is intentionally left blank. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 29: Chapter 2 Installing Authorized Send

    The System Administrator for the target MEAP device is best suited for installing the Authorized Send application, using a networked computer that is connected to the Internet and the device. Before installation, you must obtain the license file from www.canon.com/Meap, and have the IP address of the MEAP-enabled device. IMPORTANT •...
  • Page 30 2. Enter MeapSmsLogin in [Password] ➞ click [Log In]. The SMS Application List screen is displayed. 3. Click the [Install] tab. The SMS Install Application/License screen is displayed. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 31 4. Under <Application File>, click [Browse] to the right of Path. 5. Navigate to the drive or directory containing the .jar file ➞ select the file ➞ click [Open]. IMPORTANT Make sure that you select the file that ends with the .jar extension for the application file.
  • Page 32 7. Under <License File>, click [Browse] to the right of Path. IMPORTANT The license file must be downloaded from the LMS beforehand. For more information, contact your local authorized Canon dealer. 8. Navigate to the drive or directory containing the .lic file ➞ select the file ➞ click [Open]. IMPORTANT Make sure that you select the file that ends with the .lic extension for the license file.
  • Page 33 10. Click [OK]. During installation, the message <Installing…Please wait a moment.> is displayed. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 34 11. Click the [Authorized Send] radio button ➞ click [Start]. Note that the status of the Authorized Send application is <Installed> before clicking [Start]. The status will change to <Started> if successful. Installation is complete. 12. Click [Log Out] to exit SMS. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 35: Chapter 3 Configuring Authorized Send

    Chapter 3 Configuring Authorized Send This chapter describes how to configure Authorized Send from a Web browser and set up the authentication servers, address book servers, share names, and options for the Scan to E-Mail, Scan to Fax, and Scan to Folder functions. It also describes how to configure the application’s interface appearance using the optional Brand Configuration Tool.
  • Page 36 If you are using a temporary license and the license has expired, the message <The Authorized Send license has expired. Please contact your Canon dealer.> will be displayed. You must update your license file, or you will not be able to access the Configuration servlet.
  • Page 37 4. Select the authentication method ➞ configure the settings based on the selected authentication method ➞ click [Create]. (See on p. 49.) The available settings vary, depending on the selected authentication method. The Authentication Server is created, and is added to the list on the Authentication Servers screen.
  • Page 38 6. Configure the settings under <General Settings> ➞ click [Save]. (See E-Mail Service Settings,” 7. Click [E-Mail Service] ➞ [Address Book]. The Address Book Servers screen is displayed. 8. Click [Add]. The Create Address Book Server screen is displayed. Authorized Send Installation and Configuration Guide for imageRUNNER Machines on p.
  • Page 39 9. Configure the settings on the Create Address Book Server screen ➞ click [Create]. The address book server is created, and is added to the list on the Address Book Servers screen. 10. Click [Scan to E-Mail]. The Scan to E-Mail screen is displayed. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 40 11. Click the [Enable Scan to E-mail] check box ➞ click [Save]. If you want to restrict users to only send e-mail messages to themselves, select the [E-mail to self only] check box. If you want to restrict access to the [Address Book] key or the [To], [Subject], [Body], or [File Name] text boxes on the SCAN TO EMAIL screen on the machine, select the respective check boxes under <Disabled>.
  • Page 41 12. Click [Scan to Fax]. The Scan to Fax screen is displayed. 13. Click the [Enable Scan to Fax] check box ➞ enter the appropriate template configuration in the [Fax Recipient Template] text box ➞ click [Save]. (See “Configuring Scan to Fax Settings,” A message is displayed, informing you that the settings have been saved.
  • Page 42 14. Click [Scan to Folder] ➞ [General]. The Scan to Folder screen is displayed. 15. Select the [Enable Scan to Folder] check box ➞ configure the Scan to Folder Access Controls ➞ enter the IP address of the NetBIOS name server in [WINS Server IP] ➞...
  • Page 43 Select the [Test] check box if you want the connection to the WINS server to be verified before you save the settings. Select the [Enable Dynamic Folder Creation] check box if you want a sub-folder to be automatically created when a user tries to scan to a folder that does not exist. Select the [Only for Preset Shares] check box to restrict a user to only scan to a dynamic folder that was created as a preset share by the System Administrator beforehand.
  • Page 44 17. Click [Add] ➞ specify the Share Name settings ➞ click [Create]. (See Preset Share,” on p. 103.) The new preset share is added to the list on the Preset Shares screen. 17.1 If you want to specify your home directory as a preselected share that will automatically appear in the Preset Share drop-down list on the SCAN TO FOLDER screen, select [Home Directory (if exists)] from the Preselected Share drop-down list ➞...
  • Page 45 18. Click [Scan Settings] The Scan Settings screen is displayed. 19. Specify the scan settings, as necessary ➞ click [Save]. (See Settings,” on p. 108.) A message is displayed, informing you that the settings have been saved. Authorized Send Installation and Configuration Guide for imageRUNNER Machines “Configuring Scan...
  • Page 46 20. Click [Options]. The Options screen is displayed. 21. Specify the optional settings, as necessary ➞ click [Save]. (See Optional Settings,” A message is displayed, informing you that the settings have been saved. Authorized Send Installation and Configuration Guide for imageRUNNER Machines on p.113.) “Configuring...
  • Page 47 22. Click [Logs]. The Logs screen is displayed. 23. Check the [Enable Logging] check box ➞ specify the Severity Level ➞ configure the syslog servers ➞ click [Save]. (See You can also view, download, or delete the current log file. For more information, “Configuring Log Settings,”...
  • Page 48 24. If you want to verify the version number of Authorized Send, click [About]. 25. Click [Logout]. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 49: Creating An Authentication Server

    Creating an Authentication Server You can create up to 10 domains for authentication. IMPORTANT If you select the Kerberos protocol for the authentication method, make sure that the device clock setting is properly synchronized with the configured authentication server and address book server. For more information on synchronizing the device clock with the server clock, see p.
  • Page 50 4. Click the Method drop-down list to select the authentication method. [Kerberos]: The machine communicates directly to Active Directory. [NTLM]: The machine communicates directly to Active Directory. [Simple]: Necessary if you use Domino or eDirectory for authentication. [Anonymous]: Configuring an anonymous authentication server enables you to use Authorized Send without logging on to the application.
  • Page 51 5. Specify the settings for the selected authentication method. If you select [Kerberos] as the authentication method, specify the Authentication Settings, Retrieve User E-Mail Address During Authentication, Scan to Home Directory Settings, and Scan to Folder Authentication Settings. Authentication Settings Method: Pull Host from DNS:...
  • Page 52 Port: SSL: Test: Hostname: Domain Name: Pull Port from DNS: Retrieve User E-Mail Address During Authentication Address Book Server: Authorized Send Installation and Configuration Guide for imageRUNNER Machines This text box is only displayed if Pull Host from DNS is set to ‘No’...
  • Page 53 DN (Distinguished Name) of the location of the user accounts. If the directory server is authenticating against Active Directory and the domain is, for example, us.canon.com, then the search root is dc=us, dc=canon, dc=com. [Search Root] only appears if the [Retrieve Home Directory (Active Directory only)] check box is selected.
  • Page 54 Scan to Folder Authentication Settings NTLM Authentication: NTLM domain name: IMPORTANT If you select the Kerberos protocol for the authentication method, make sure that the device clock setting is properly synchronized with the configured authentication server and address book server. For more information on synchronizing the device clock with the server clock, see “Synchronizing the Device and Server Time,”...
  • Page 55 Authentication Settings Method: Pull Host from DNS: Host: Port: SSL: Test: Domain Name: Pull Port from DNS: Authorized Send Installation and Configuration Guide for imageRUNNER Machines NTLM Select [Yes] to automatically pull the host information from the DNS after you click [Create]. Select [No] if you want to manually configure the host information.
  • Page 56 DN (Distinguished Name) of the location of the user accounts. If the directory server is authenticating against Active Directory and the domain is, for example, us.canon.com, then the search root is dc=us, dc=canon, dc=com. [Search Root] only appears if the [Retrieve Home Directory (Active Directory only)] check box is selected.
  • Page 57 Scan to Folder Authentication Settings NTLM Authentication: NTLM domain name: If you select [Simple] as the authentication method, specify the Authentication Settings, Retrieve User E-Mail Address During Authentication, Scan to Home Directory Settings, and Scan to Folder Authentication Settings. Authentication Settings Method: Host: Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 58 If the directory server is authenticating against eDirectory or Domino and the organization is, for example, Canon, then the search root is o=canon. If you have already configured an address book server, select the address book server from which your...
  • Page 59 Scan to Home Directory Settings Retrieve Home Directory (Active Directory only): element in the Preselected Share drop-down list on Search Root: LDAP Match Attribute: Scan to Folder Authentication Settings NTLM Authentication: NTLM domain name: Authorized Send Installation and Configuration Guide for imageRUNNER Machines Select this check box to obtain the currently logged on user’s home directory information from the authentication server.
  • Page 60 If you select [Anonymous] as the authentication method, specify the Anonymous User Information, and Address Book Server for E-Mail Lookup. Authentication Settings Method: Anonymous User Information Anonymous User Name: Anonymous User E-Mail: Authorized Send Installation and Configuration Guide for imageRUNNER Machines Anonymous Enter the user name for anonymous sending.
  • Page 61 IMPORTANT • If an anonymous authentication server is configured, the SIGN IN screen on the machine is bypassed, and the user is logged on as an anonymous user. If more than one Authorized Send function is enabled, the MAIN screen on the machine is displayed. If only one Authorized Send function is enabled, that function’s screen is displayed.
  • Page 62: Editing An Authentication Server

    Editing an Authentication Server You can edit a previously created authentication server from the Authorized Send Configuration screen. 1. Click [Authentication] ➞ select the check box next to the authentication server you want to edit ➞ click [Edit]. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 63 2. Edit the settings for the authentication server as necessary ➞ click [Update]. If you make a mistake, click [Reset] to return the settings to their original values. To cancel editing the authentication server and return to the Authentication Servers screen, click [Cancel].
  • Page 64: Deleting An Authentication Server

    Deleting an Authentication Server You can delete a previously created authentication server from the Authorized Send Configuration screen. 1. Click [Authentication] ➞ select the check box next to the authentication server you want to delete ➞ click [Delete]. 2. Click [OK]. If you do not want to delete the authentication server, click [Cancel].
  • Page 65: Configuring The E-Mail Service Settings

    Configuring the E-Mail Service Settings You can configure the settings for the SMTP server. NOTE The E-Mail Service Settings must be configured to use the Scan to E-Mail and Scan to Fax functions. 1. Click [E-Mail Service] ➞ [General]. If necessary, see the screen shot in step 5 of p.
  • Page 66 Use Public Credentials: SMTP Public Username: SMTP Public Password: 3. Click [Save]. If you make a mistake while configuring the settings, click [Reset] to return the settings to their original values. A message is displayed informing you that the configuration has been saved. IMPORTANT •...
  • Page 67: Creating An Address Book Server

    Creating an Address Book Server You can create up to 10 address book Servers. When you create an address book server, you can either associate it with an authentication server, which has been previously created, or you can create a standalone address book server with no association to an authentication server.
  • Page 68 2. Specify whether you want to create an address book server with or without an association to an authentication server. If you want to create an address book server with an association to an authentication server, select [Kerberos], [NTLM], [Simple], or [Anonymous] from the Authentication Server drop-down list under <Retrieve User E-Mail Address for the Following Authentication Server>.
  • Page 69 Depending on your environment, you must enter the Base DN (Distinguished Name) of the location of the user accounts. If the directory server is authenticating against Active Directory and the domain is, for example, us.canon.com, then the search root is dc=us, dc=canon, dc=com.
  • Page 70 LDAP Match Attribute: LDAP Email Attribute: Maximum Search Results: Authorized Send Installation and Configuration Guide for imageRUNNER Machines Enter the LDAP Match Attribute to be used for e-mail address retrieval. If the [Retrieve Home Directory (Active Directory only] check box is selected under <Scan to Home Directory Settings>, the value entered here is also used for Home Directory retrieval.
  • Page 71 Scan to Home Directory Settings Retrieve Home Directory (Active Directory only): attribute of “Home Directory.” This will create a Authorized Send Installation and Configuration Guide for imageRUNNER Machines Select this check box to obtain the currently logged on user’s home directory information from the address book server with the LDAP Home Directory element in the Preselected Share drop-down list on the Scan to Folder...
  • Page 72 2.1.2 If you select a Simple authentication server, specify the Address Book Settings and Scan to Home Directory Settings ➞ proceed to step 4. Address Book Settings Same as Authentication Server: LDAP Email Attribute: Maximum Search Results: Authorized Send Installation and Configuration Guide for imageRUNNER Machines Select [Yes] to create the address book with the same credentials as the selected authentication server.
  • Page 73 Scan to Home Directory Settings Retrieve Home Directory (Active Directory only): attribute of “Home Directory.” This will create a 2.1.3 If you select an Anonymous authentication server, proceed to step 3 and enter the configuration information for the authentication method. NOTE Authorized Send Installation and Configuration Guide for imageRUNNER Machines Select this check box to obtain the currently...
  • Page 74 If you want to create a standalone address book server with no association to an authentication server, select [None] from the Authentication Server drop- down list under <Retrieve User E-Mail Address for the Following Authentication Server>. NOTE • The items in the Authentication Server drop-down list correspond to previously registered authentication servers.
  • Page 75 3. Select the authentication method from the Method drop-down list. [Kerberos]: The machine communicates directly to Active Directory. [NTLM]: The machine communicates directly to Active Directory. [Simple]: Necessary, if you use Domino or eDirectory for authentication. [Anonymous]: Authorized Send will not use any user login credentials to search the address book for e-mail addresses.
  • Page 76 If you select [Kerberos] as the authentication method, specify the Address Book Settings and Scan to Home Directory Settings. Address Book Settings Method: Pull Host from DNS: Host: Port: Authorized Send Installation and Configuration Guide for imageRUNNER Machines Kerberos Select [Yes] to automatically pull the host information from the DNS after you click [Create].
  • Page 77 SSL: Test: Hostname: Domain Name: Pull Port from DNS: Use Public Credentials: Public User: Name: Public Password: This text box is only displayed if Use Public Credentials Authorized Send Installation and Configuration Guide for imageRUNNER Machines This check box is only displayed if Pull Host from DNS is set to ‘No’...
  • Page 78 DN (Distinguished Name) of the location of the user accounts. If the directory server is authenticating against Active Directory and the domain is, for example, us.canon.com, then the search root is dc=us, dc=canon, dc=com. Enter the LDAP Match Attribute to be used for e-mail address retrieval.
  • Page 79 Scan to Home Directory Settings Retrieve Home Directory (Active Directory only): Directory.” This will create a Home Directory element IMPORTANT • If you select the Kerberos protocol for the authentication method, make sure that the device clock setting is properly synchronized with the configured authentication server and address book server.
  • Page 80 If you select [NTLM] as the authentication method, specify the Address Book Settings and Scan to Home Directory Settings. Address Book Settings Method: Pull Host from DNS: Host: Port: Authorized Send Installation and Configuration Guide for imageRUNNER Machines NTLM Select [Yes] to automatically pull the host information from the DNS after you click [Create].
  • Page 81 Depending on your environment, you must enter the Base DN (Distinguished Name) of the location of the user accounts. If the directory server is authenticating against Active Directory and the domain is, for example, us.canon.com, then the search root is dc=us, dc=canon, dc=com.
  • Page 82 LDAP Match Attribute: LDAP Email Attribute: Maximum Search Results: Authorized Send Installation and Configuration Guide for imageRUNNER Machines Enter the LDAP Match Attribute to be used for e-mail address retrieval. If the [Retrieve Home Directory (Active Directory only] check box is selected under <Scan to Home Directory Settings>, the value entered here is also used for Home Directory retrieval.
  • Page 83 Scan to Home Directory Settings Retrieve Home Directory (Active Directory only): Directory.” This will create a Home Directory element IMPORTANT • Click the [Test] check box if you want to test the validity of the IP addresses you entered before saving. •...
  • Page 84 If you select [Simple] as the authentication method, specify the Address Book Settings and Scan to Home Directory Settings. Address Book Settings Method: Host: Port: SSL: Test: Domain Name: Authorized Send Installation and Configuration Guide for imageRUNNER Machines Simple Enter the DNS name or IP address of the address book server.
  • Page 85 If the directory server is authenticating against eDirectory or Domino and the organization is, for example, Canon, then the search root is o=canon. Enter the LDAP Match Attribute to be used for e-mail address retrieval. If the [Retrieve Home Directory (Active Directory only] check box is selected under <Scan to...
  • Page 86 Scan to Home Directory Settings Retrieve Home Directory (Active Directory only): Directory.” This will create a Home Directory element IMPORTANT • Click the [Test] check box if you want to test the validity of the IP addresses you entered before saving. •...
  • Page 87 If you select [Anonymous] as the authentication method, specify the Address Book Settings and Scan to Home Directory Settings. Address Book Settings Method: Host: Port: SSL: Test: Domain Name: Authorized Send Installation and Configuration Guide for imageRUNNER Machines Anonymous Enter the DNS name or IP address of the address book server.
  • Page 88 DN (Distinguished Name) of the location of the user accounts. If the directory server is authenticating against Active Directory and the domain is, for example, us.canon.com, then the search root is dc=us, dc=canon, dc=com. If the directory server is authenticating against eDirectory or Domino and the organization is, for example, Canon, then the search root is o=canon.
  • Page 89 Scan to Home Directory Settings Retrieve Home Directory (Active Directory only): Directory.” This will create a Home Directory element IMPORTANT • Click the [Test] check box if you want to test the validity of the IP addresses you entered before saving. •...
  • Page 90: Editing An Address Book Server

    Editing an Address Book Server You can edit a previously created address book server from the Address Book Servers configuration screen. 1. Click [E-Mail Service] ➞ [Address Book] ➞ select the check box next to the address book server you want to edit ➞ click [Edit]. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 91 2. Edit the settings for the address book server as necessary ➞ click [Update]. If you make a mistake while editing the address book server settings, click [Reset] to return the settings to their original values. To cancel editing the address book server and return to the Address Book Servers screen, click [Cancel].
  • Page 92: Deleting An Address Book Server

    Deleting an Address Book Server You can delete a previously created address book server from the Address Book Servers configuration screen. 1. Click [E-Mail Service] ➞ [Address Book] ➞ select the check box next to the address book server you want to delete ➞ click [Delete]. 2.
  • Page 93: Configuring Scan To E-Mail Settings

    Configuring Scan to E-Mail Settings You can enable the Scan to E-Mail function, restrict user access to the [Address Book] key and [To], [Subject], [Body], and [File Name] text boxes on the SCAN TO EMAIL screen on the machine, as well as enable E-mail CC to self. 1.
  • Page 94 3. Configure the settings under <Access Controls>. Access Controls E-mail to self only: Disabled Column Address Book: Authorized Send Installation and Configuration Guide for imageRUNNER Machines Select this check box if you want to restrict users to only send e-mail messages to themselves, and to automatically disable the [Address Book] key and the [To] text box on the SCAN TO EMAIL screen on the machine.
  • Page 95 Self Subject: Required: Body: File Name: Default Value Column Subject: Body: Authorized Send Installation and Configuration Guide for imageRUNNER Machines This check box is only displayed when the [E-mail to self only] check box is not selected. When the [Self] check box is selected, the e-mail address of the user logged on to Authorized Send is displayed in the [To] text box on the SCAN TO EMAIL Screen.
  • Page 96 4. If necessary, click the [E-mail CC to self] check box ➞ click [Save]. If you select [E-mail CC to self], a copy of each e-mail message sent via SCAN TO EMAIL will be sent to the currently logged on user’s e-mail address. IMPORTANT You must select the [Self] check box next to the [To] text box if you selected to disable the [Address Book] and [To] check boxes under <Disabled>...
  • Page 97: Configuring Scan To Fax Settings

    3.10 Configuring Scan to Fax Settings You can enable the Scan to Fax function and configure the General Settings. 1. Click [Scan to Fax]. If necessary, see the screen shot in step 12 of on p. 35. 2. Click the [Enable Scan to Fax] check box. If you want to disable the Scan to Fax function, click the [Enable Scan to Fax] check box to clear the check mark.
  • Page 98 3. Specify the General Settings ➞ click [Save]. General Settings Fax Recipient Template: Enter the appropriate template configuration. Append: Append drop-down: Authorized Send Installation and Configuration Guide for imageRUNNER Machines For example, if you enter ${FAXNUMBER}@faxserver.company.com as the string, and the fax number entered by the user (for example, ‘1234567’) when sending from the Scan to Fax screen, Authorized Send sends an e-mail message to the SMTP server with “1234567@faxserver.company.com”...
  • Page 99 NOTE • The user does not see the template. The user only has to enter the fax number(s) on the Authorized Send SCAN TO FAX screen on the machine. • If you upgrade Authorized Send from version 3.x to 4.0 or later, the fax template is automatically updated to the current format, which would include: '${FAXNUMBER}' as the prefix to what was configured in version 3.x.
  • Page 100: Configuring Scan To Folder Settings

    3.11 Configuring Scan to Folder Settings You can enable the Scan to Folder function and configure the Access Controls and General Settings. 1. Click [Scan to Folder] ➞ [General]. If necessary, see the screen shot in step 14 of on p. 35. 2.
  • Page 101 3. Configure the settings under <Access Controls>. Access Controls Scan to Home Directory/Preselected Share only: Disabled Column Preset Share: File Server/Path: Browse: File Name: Authorized Send Installation and Configuration Guide for imageRUNNER Machines Select this check box if you want to automatically disable the [Preset Share], [File Server/Path], and [Browse] check boxes with one click.
  • Page 102 4. Specify the General Settings ➞ click [Save]. General Settings WINS Server IP: Test: Enable Dynamic Folder Creation: Only for Preset Shares: Authorized Send Installation and Configuration Guide for imageRUNNER Machines Enter the IP address of the NetBIOS name server. Select this check box if you want the connection to the WINS server to be verified before you save the settings.
  • Page 103: Creating A Preset Share

    3.12 Creating a Preset Share You can create any number of preset shares. 1. Click [Scan to Folder] ➞ [Preset Shares]. If necessary, see the screen shot in step 16 of on p. 35. 2. Click [Add]. Authorized Send Installation and Configuration Guide for imageRUNNER Machines “Flow of Configuration Operations,”...
  • Page 104 If you want to specify your home directory as a preselected share that will automatically appear in the Preset Share drop-down list on the SCAN TO FOLDER screen, select [Home Directory (if exists)] from the Preselected Share drop-down list ➞ click [Save]. NOTE If you do not have a Home Directory, or if you do not select [Home Directory (if exists)] from the Preselected Share drop-down list, no share will appear on the...
  • Page 105 3. Specify the Share Name settings ➞ click [Create]. Create Share Name Share Name: Enter a name for the preset share. The Share Name is case-sensitive. You can enter a maximum of 31 characters. File Server: Enter the DNS name or IP Address to send documents. File Path: Enter the path of the folder to send documents.
  • Page 106: Editing A Preset Share

    3.13 Editing a Preset Share You can edit a previously created preset share from the Scan to Folder configuration screen. 1. Click [Scan to Folder] ➞ [Preset Shares] ➞ select the check box next to the preset share you want to edit ➞ click [Edit]. 2.
  • Page 107: Deleting A Preset Share

    3.14 Deleting a Preset Share You can delete a previously created preset share from the Scan to Folder configuration screen. 1. Click [Scan to Folder] ➞ [Preset Shares] ➞ select the check box next to the preset share you want to delete ➞ click [Delete]. 2.
  • Page 108: Configuring Scan Settings

    3.15 Configuring Scan Settings You can configure the Default File Type Settings and Default Scan Settings For File Types. This causes the default scan settings to automatically change based on the file type that is selected. 1. Click [Scan Settings]. If necessary, see the screen shot in step 18 of on p.
  • Page 109 3. Configure the settings under <Default Scan Settings for File Types> ➞ click [Save]. Default Scan Settings for File Types Scan Settings for File Type: Select [PDF], [PDF(Compct)], [PDF(OCR)], [TIFF], Disabled Column Paper Size: Resolution: Authorized Send Installation and Configuration Guide for imageRUNNER Machines [TIFF(Single)], or [JPEG] from the drop-down list.
  • Page 110 Brightness: PDF Encryption: Image Mode: Color Mode: Sided: Settings Column Paper Size: Authorized Send Installation and Configuration Guide for imageRUNNER Machines Select this check box to disable and gray out the Brightness scroll bar on the SCAN SETTINGS screen. Select this check box to hide the PDF Encryption icon on the SCAN SETTINGS screen.
  • Page 111 Resolution: Brightness: PDF Encryption: Image Mode: Authorized Send Installation and Configuration Guide for imageRUNNER Machines Select [200x200], [300x300], or [600x600] from the drop-down list to correspond with the file type that you selected from the Scan Settings for File Type drop-down list.
  • Page 112 Color Mode: Sided: NOTE The table below displays the default scan settings for each file type that automatically appears on the SCAN SETTINGS screen on the machine, unless they are changed and saved by the System Administrator. File Type PDF(Compct) PDF(OCR) TIFF TIFF(Single)
  • Page 113: Configuring Optional Settings

    3.16 Configuring Optional Settings You can configure the timeout settings, decide whether to populate the User Name text box on the Authorized Send SIGN IN screen, enable USB keyboard input, and rename the tab of the Authorized Send application on the machine. IMPORTANT You can use third-party USB keyboards with Authorized Send.
  • Page 114 Enable USB Keyboard input: Authorized Send Installation and Configuration Guide for imageRUNNER Machines Select this check box to enable your machine to utilize an attached USB keyboard. If this check box is not selected, your machine cannot utilize an attached USB keyboard and automatically uses the MEAP virtual keyboard instead.
  • Page 115 Only Use Cherry G84 Keyboard: Configuration Session Timeout (min): Network Socket Timeout (seconds): Authorized Send Installation and Configuration Guide for imageRUNNER Machines Select this check box if you want to only use the Cherry G84 keyboard. By default, this check box is selected.
  • Page 116 Application Display Name (up to 20 characters): Authorized Send Installation and Configuration Guide for imageRUNNER Machines Enter the application display name. You can enter a maximum of 20 characters. Valid characters are the printable ASCII characters and the carriage return. The default setting is ‘Authorized Send’.
  • Page 117: Configuring Log Settings

    3.17 Configuring Log Settings You can enable the Log function and view or delete the current log file. 1. Click [Logs]. If necessary, see the screen shot in step 22 of on p. 35. 2. Click the [Enable Logging] check box. When the [Enable Logging] check box is selected, Authorized Send will log debug and error messages up to a maximum file size of 1 MB (1,024 KB).
  • Page 118 3. Select the severity level from the Severity Level drop-down list. The table below shows the supported levels of increasing severity and their respective numeric codes. Severity Level Emergency Alert Critical Error Warning Notice Info Debug When you select a severity from the drop-down list, that severity and all severities with a lower numeric value are logged.
  • Page 119 4. Select the [Enable Syslog] check box. If you select the [Enable Syslog] check box, at least one syslog server must be configured. Authorized Send supports only the user-level messages (Numeric Code = 1) and security/authorization messages (Numeric Code = 4) Facilities of the Syslog RFC3164 Protocol.
  • Page 120 5. Enter a syslog server’s IP address under <Syslog Server> in the table ➞ enter the corresponding UDP port number for the syslog server under <UDP Port> in the table. You can configure up to three syslog servers. You can enter a maximum of five numbers for the UDP port.
  • Page 121 9. To delete the log file, click [Delete]. If you want to disable the Log function, click the [Enable Logging] check box to clear the check mark ➞ click [Save]. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 122: Changing The Login Id And Password

    3.18 Changing the Login ID and Password You can change your Login ID and password to log on to the Authorized Send Configuration servlet. 1. Display the Authorized Send Configuration screen and log on to the Authorized Send Configuration servlet. If necessary, see steps 1 and 2 of 2.
  • Page 123 3. Enter the new login ID in the [New Login ID] text box ➞ confirm the ID in the [Confirm New Login ID] text box ➞ enter the new password in the [New Password] text box ➞ confirm the password in the [Confirm New Password] text box ➞...
  • Page 124: Using The Brand Configuration Tool (Optional)

    3.19 Using the Brand Configuration Tool (Optional) This section describes how to dynamically modify the appearance of the end user’s interface screens using the optional Brand Configuration tool. You can customize the application’s banner image and colors, portal service logo, screen colors, button colors, and special button colors.
  • Page 125 The following section describes the different areas that make up the Brand Configuration tool screen. Description Area: The description area displays an explanation of the Brand Configuration tool’s purpose. Preview Area: The preview area displays a preview of how the end user’s interface screens appear after changing the selected images and colors.
  • Page 126 Status Area: The status area displays messages as various brand configuration operations are performed. It also displays informative messages whenever errors occur. If a message is larger than the display area, a scrollbar appears to enable you to view the entire message.
  • Page 127 Settings Area: The settings area displays the text boxes used for modifying image and color settings seen in the preview area. The settings area is made up of the Portal Service Logo, Banner, Screen, Button, and Special Button. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 128 Portal Service Logo: The Portal Service Logo provides a text box for entering the location of the application logo you want, and provides a preview of the selected image. Banner: The Banner area provides text boxes for specifying the background and foreground colors, and entering the location of the banner you want.
  • Page 129 2. Select [Clear All], [Default], or [Current]. [Clear All]: Click to clear all of the settings. [Default]: Click to load the default values for each setting and populate the corresponding text boxes in the settings area. [Current]: Click to load the currently saved values for each setting and populate the corresponding text boxes in the settings area.
  • Page 130 4. If you want to specify the background and foreground colors, and select the image to be displayed in the end user’s interface banner area: Click the [Background Color] text box under <Banner> ➞ enter three comma-separated digits representing the desired RGB color. Click the [Foreground Color] text box under <Banner>...
  • Page 131 5. If you want to specify the background, foreground, and border colors to be displayed in the end user’s interface screen area: Click the [Background Color] text box under <Screen> ➞ enter three comma-separated digits representing the desired RGB color. Click the [Foreground Color] text box under <Screen>...
  • Page 132 6. If you want to specify the end user’s interface background and foreground colors for the normal buttons: Click the [Background Color] text box under <Button> ➞ enter three comma-separated digits representing the desired RGB color. Click the [Foreground Color] text box under <Button> ➞ enter three comma-separated digits representing the desired RGB color.
  • Page 133 7. If you want to specify the end user’s interface background and foreground colors for the special buttons: Click the [Background Color] text box under <Special Button> ➞ enter three comma-separated digits representing the desired RGB color. Click the [Foreground Color] text box under <Special Button> ➞ enter three comma-separated digits representing the desired RGB color.
  • Page 134 This page is intentionally left blank. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 135: Chapter 4 Configuring The Meap Device

    Chapter 4 Configuring the MEAP Device This chapter describes how to configure your MEAP-enabled device so that you can use it with the Authorized Send application. IMPORTANT Inbox 99 must be available for use on the MEAP device (i.e., is not full), and with no password protection.
  • Page 136 2. Press [System Settings]. If the System Manager ID and System Password have been set, enter the System Manager ID and System Password using ⓪ – ⑨ (numeric keys) ➞ press (Log In/Out). Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 137 3. Press [Network Settings]. 4. Press [TCP/IP Settings]. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 138 5. Press [DNS Server Settings]. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 139 6. Press [Primary DNS Server] ➞ enter the IP address using ⓪ – ⑨ (numeric keys). IMPORTANT • It is not necessary to enter a [Secondary DNS Server] or [Host Name]; however, you must enter a [Domain Name]. • If you are using SMTP Authentication, make sure that the host name does not contain spaces (including trailing spaces) or trailing periods.
  • Page 140: Specifying The Auto Clear Mode For Auto Log Off

    Specifying the Auto Clear Mode for Auto Log Off If the machine is idle for a certain period of time (after a scan to e-mail, scan to fax, or scan to folder key operation or job), you will be logged off of Authorized Send. This period of time is called the "Auto Clear Time."...
  • Page 141 3. Press [Auto Clear Time]. 4. Press [-] or [+] to specify the desired Auto Clear Time ➞ press [OK]. You can also enter values using ⓪ – ⑨ (numeric keys). 5. Press [Done] repeatedly until the Basic Features screen is displayed. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 142: Synchronizing The Device And Server Time

    Synchronizing the Device and Server Time If you configure an authentication server or address book server for Kerberos authentication, you must ensure that the device clock and server clock are synchronized within the maximum server specified clock skew tolerance of ‘5’ minutes. When you authenticate using Kerberos, if there is more than a 5 minute time difference between the device clock and server clock, an error message is displayed.
  • Page 143 3. Press [Network Settings]. 4. Press [TCP/IP Settings]. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 144 5. Press [SNTP Settings]. NOTE If the desired setting is not displayed, press [▼] or [▲] to scroll to the desired setting. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 145 6. Specify the SNTP settings. <Use SNTP>: <Polling Interval>: [NTP Server Address]: Enter the NTP server address or host name. Authorized Send Installation and Configuration Guide for imageRUNNER Machines Select [On] to perform time synchronization using SNTP. Select the interval for performing time synchronization from ‘1’...
  • Page 146 7. Press [NTP Server Check] to check the status of the NTP server. If <OK> is displayed next to [NTP Server Check], time synchronization is working correctly via SNTP. If <Error> is displayed next to [NTP Server Check], check the settings for [NTP Server Address] set in step 6.
  • Page 147: Manually Adjusting The Device Time

    4.3.2 Manually Adjusting the Device Time You can manually adjust the device time to match the Kerberos authentication server or address book server time. 1. On the machine’s control panel, press 2. Press [Timer Settings]. Authorized Send Installation and Configuration Guide for imageRUNNER Machines (Additional Functions).
  • Page 148 3. Press [Time Fine Adjustment]. 4. Press [-] or [+] to adjust the time as necessary ➞ press [OK]. 5. Press [Done] repeatedly until the Basic Features screen is displayed. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 149: Chapter 5 Troubleshooting

    Chapter 5 Troubleshooting This chapter explains the various issues that may arise when installing and configuring the necessary components of the Authorized Send application, along with possible causes and remedies. You cannot connect to the network. Problem Make sure that: Remedy •...
  • Page 150 The [Scan to E-Mail] button is disabled. Problem Check to make sure that: Remedy • An e-mail address is specified in the user’s address book account. • An SMTP server address is configured for Authorized Send. • For more information, see IMPORTANT It is necessary for the user to log off, and then log back on after the changes mentioned above have been made to activate the [Scan to E-Mail] key.
  • Page 151: Chapter 6 List Of Error Messages

    ➞ click [OK] to close the dialog box. • If any error messages are displayed but are not listed in this chapter, contact your local authorized Canon dealer. Authorized Send Installation and Configuration Guide for imageRUNNER Machines...
  • Page 152: Configuration Screen Error Messages

    Configuration Screen Error Messages Configuration screen messages are displayed on the Configuration screen of the Authorized Send Configuration servlet. If an error occurs during the configuration process, it is displayed in the body of the Configuration servlet screen, and is listed here.
  • Page 153 Message Authentication Port has to be a positive number. Authentication Hostname is missing. Authentication Public DN is missing. Authentication LDAP Match Attribute is missing. Authentication Search Root is missing. Anonymous User Name is missing. Anonymous User Name is too long. It cannot exceed 40 characters.
  • Page 154 Message Anonymous User E-Mail is not valid: local part cannot contain character(s) ‘?’, ‘&’ Anonymous User E-Mail is not valid: domain cannot be empty if ‘@’ is present. Anonymous User E-Mail is not valid: domain cannot exceed 255 characters. Anonymous User E-Mail is not valid: hyphen, ‘-’, or dot, ‘.’, cannot be the first or the last character in the domain.
  • Page 155: E-Mail Service Configuration Screen Error Messages

    Message Duplicated authentication server: an authentication server with domain [x] and authentication method [y] already exists. 6.1.3 E-Mail Service Configuration Screen Error Messages This section explains the E-mail Service Configuration screen error messages, along with possible causes and remedies. For more information on the remedies, see “Configuring the E-Mail Service Settings,”...
  • Page 156: Address Book Servers Screen Error Message

    6.1.4 Address Book Servers Screen Error Message This section explains the Address Book Servers screen error message, along with a possible cause and remedy. For more information on the remedy, see Address Book Server,” Message Maximum address book servers have been created. To create a new address book server, you have to delete the old one(s) first.
  • Page 157: Scan To E-Mail Configuration Screen Error Messages

    Message Address Book Domain is missing. Address Book Search Root is missing. Address Book LDAP Match Attribute is missing. Address Book LDAP Email Attribute is missing. Connection Failed. Could not connect to x:y Connection Failed. Could not resolve host name: x. Duplicated address book server: an address book server with domain [x] and...
  • Page 158: Scan To Fax Configuration Screen Error Messages

    Message Default value for ‘Subject’ field cannot be empty if the field is disabled and required. Default value for ‘Subject’ field is too long. It cannot exceed 255 characters. Default value for ‘Body’ field is too long. It cannot exceed 255 characters. 6.1.7 Scan to Fax Configuration Screen Error Messages This section explains the Scan to Fax Configuration screen error messages, along...
  • Page 159: Create/Update Share Name Screen Error Messages

    Message Connection Failed. Could not resolve host name: x. 6.1.9 Create/Update Share Name Screen Error Messages This section explains the Create Share Name and Update Share Name screen error messages, along with possible causes and remedies. For more information on the remedies, see “Creating a Preset Share,”...
  • Page 160: Options Screen Error Messages

    6.1.10 Options Screen Error Messages This section explains the Options screen error messages, along with possible causes and remedies. For more information on the remedies, see Settings,” on p. 113. Message Configuration Session Timeout cannot be zero. Configuration Session Timeout cannot exceed 60 minutes.
  • Page 161: Logs Screen Error Messages

    Message Application Display Name cannot contain the following characters: ‘x’, ‘y’, ‘z’ *Warning!: Due to the size of the Application Display name entered, Application Display Name may cover the Authorized Send tab icon. *Warning!: Due to the size of the Application Display name entered, Application Display Name may be cut off.
  • Page 162: Change Login Id & Password Screen Error Messages

    6.1.12 Change Login ID & Password Screen Error Messages This section explains the Change Login ID and Password screen error messages, along with possible causes and remedies. For more information on the remedies, see “Changing the Login ID and Password,” Message New Login ID and Confirm New Login ID do...
  • Page 163: Authorized Send Configuration Servlet Log On Screen Error Messages

    The [Login ID] or [Password] Enter the correct login ID or text box contains an invalid password credentials. entry. Update Authorized Send with a The Authorized Send license valid license. by contacting your has expired. local authorized Canon dealer. Remedy...
  • Page 164: Sign In Screen Notification Messages

    SIGN IN Screen Notification Messages The SIGN IN screen notification messages are displayed on the SIGN IN screen in the upper-right hand portion of the MEAP device’s UI. You will remain at the SIGN IN screen until they are resolved. 6.2.1 General Authentication Notification Messages This section explains the general authentication notification messages, along with...
  • Page 165: Kerberos Authentication Notification Messages

    6.2.2 Kerberos Authentication Notification Messages This section explains the Kerberos authentication notification messages, along with possible causes and remedies. Message Kerberos requires username, password, host and domain Kerberos bind failed, no connection to (host) Kerberos bind failed, ldap ticket to (hostname) Kerberos bind failed to host (host) hostname (hostname)
  • Page 166: Ntlm Authentication Notification Messages

    Message Unknown host (host) An unknown Kerberos error has occurred 6.2.3 NTLM Authentication Notification Messages This section explains the NTLM authentication notification messages, along with possible causes and remedies. Message NTLM requires username, password and domain NTLM bind failed, no connection to (host) NTLM bind failed to host (host) domain (domain)
  • Page 167: Simple Authentication Notification Messages

    6.2.4 Simple Authentication Notification Messages This section explains the Simple authentication notification messages, along with possible causes and remedies. Message Check Public DN and Public Password and try again Anonymous binding not accepted by host (host) Confidentiality Required Authorized Send Installation and Configuration Guide for imageRUNNER Machines Cause The public DN and public password have been configured...
  • Page 168: Main Screen Notification Messages

    MAIN Screen Notification Messages The MAIN screen notification messages are displayed on the MAIN screen in the upper-right hand portion of the MEAP device’s UI. If an error has occurred during the authentication process, it will be displayed here. 6.3.1 LDAP Failure Notification Messages This section explains the LDAP failure notification messages, along with possible causes and remedies.
  • Page 169 Message Your E-mail was not found, invalid credentials. Your E-mail was not found, invalid DN syntax. Your E-mail was not found, LDAP not supported. Your E-mail was not found, searched partial results. Your E-mail was not found, LDAP timed out. Your E-mail was not found, no results.
  • Page 170: Configuration Notification Message

    6.3.2 Configuration Notification Message This section explains the configuration notification message, along with a possible cause and remedy. Message Please contact administrator to configure E-Mail Service. 6.3.3 Warning Notification Message This section explains the warning notification message, along with a possible cause and remedy.
  • Page 171: Scan To Email Screen Notification Messages

    SCAN TO EMAIL Screen Notification Messages The SCAN TO EMAIL screen notification messages are displayed on the SCAN TO EMAIL screen in the upper-right hand portion of the MEAP device’s UI. As you interact with the application, different types of messages are displayed to notify you of an event.
  • Page 172: Scan To Email Notification Messages

    Message Press <Enter> key to validate. 6.4.3 SCAN TO EMAIL Notification Messages This section explains the SCAN TO EMAIL notification messages, along with possible causes and remedies. Message Checking SMTP Connection… Checking SMTP Authentication… 6.4.4 SCAN TO EMAIL Error Messages This section explains the SCAN TO EMAIL error messages, along with possible causes and remedies.
  • Page 173: Scan To Fax Screen Notification Messages

    SCAN TO FAX Screen Notification Messages The SCAN TO FAX screen notification messages are displayed on the SCAN TO FAX screen in the upper-right hand portion of the MEAP device’s UI. As you interact with the application, different types of messages are displayed notifying you of an event. 6.5.1 SCAN TO FAX Warning Message This section explains the SCAN TO FAX warning message, along with a possible...
  • Page 174: Scan To Fax Notification Messages

    6.5.3 SCAN TO FAX Notification Messages This section explains the SCAN TO FAX notification messages, along with possible causes and remedies. Message Checking SMTP Connection… Checking SMTP Authentication… 6.5.4 SCAN TO FAX Error Messages This section explains the SCAN TO FAX error messages, along with possible causes and remedies.
  • Page 175: Scan To Folder Screen Notification Messages

    SCAN TO FOLDER Screen Notification Messages The SCAN TO FOLDER screen notification messages are displayed on the SCAN TO FOLDER screen in the upper-right hand portion of the MEAP device’s UI. As you interact with the application, different types of messages are displayed notifying you of an event.
  • Page 176: Scan To Folder Notification Messages

    6.6.3 SCAN TO FOLDER Notification Messages This section explains the SCAN TO FOLDER notification messages, along with possible causes and remedies. Message Checking access to [share] share… Validating File Server and File Path… 6.6.4 SCAN TO FOLDER Error Messages This section explains the SCAN TO FOLDER error messages, along with possible causes and remedies.

This manual is also suitable for:

Authorized send

Table of Contents