Security Measures Provided By This Machine; Using Authentication And Managing Users; Ensuring Information Security - Ricoh Pro C720s Operating Instructions Manual

Hide thumbs Also See for Pro C720s:
Table of Contents

Advertisement

1. Getting Started

Security Measures Provided by this Machine

1

Using Authentication and Managing Users

Enabling Authentication
To control administrators' and users' access to the machine, perform administrator authentication and
user authentication using login user names and login passwords. To perform authentication, the
authentication function must be enabled. For details about authentication settings, see "Enabling
Authentication".
Specifying Authentication Information to Log on
Users are managed using the personal information managed in the machine's Address Book. By
enabling user authentication, you can allow only people registered in the Address Book to use the
machine. Users can be managed in the Address Book by the user administrator. For information on
specifying information to log on, see "Basic Authentication".
Specifying Which Functions are Available
This can be specified by the user administrator. Specify the functions available to registered users. By
making this setting, you can limit the functions available to users. For information on how to specify
which functions are available, see "Limiting Available Functions".
• p.23 "Enabling Authentication"
• p.44 "Basic Authentication"
• p.130 "Limiting Available Functions"

Ensuring Information Security

Protecting Stored Files from Unauthorized Access
You can specify who is allowed to use and access scanned files and the files in Document Server.
You can prevent activities such as the printing of stored files by unauthorized users. For details about
protecting stored files from unauthorized access, see "Specifying Access Permission for Stored Files".
Protecting Stored Files from Theft
You can specify who is allowed to use and access scanned files and the files in Document Server.
You can prevent activities such as the sending and downloading of stored files by unauthorized users.
For details about protecting stored files from theft, see "Specifying Access Permission for Stored Files".
14

Advertisement

Table of Contents
loading

Table of Contents