Fuji Xerox ApeosPort-IV C7780 Administrator's Manual page 10

Hide thumbs Also See for ApeosPort-IV C7780:
Table of Contents

Advertisement

Encryption Features for Communication .............................................................368
Encryption and Digital-Signature Features for Scan Files ...................................369
Configuration of HTTP Communications Encryption................................................370
Installation Overview............................................................................................370
Step1 Configuration on the Machine ...................................................................370
Step2 Configuration on the Computer .................................................................371
Configuration of Encryption using IPSec..................................................................372
Installation Overview............................................................................................372
Step1 Import and Configuration of a Certificate...................................................372
Step3 Configuration on the Computer .................................................................374
Configuration of E-mail Encryption/Digital Signature ...............................................375
Installation Overview............................................................................................375
Step1 Configuration on the Machine ...................................................................375
Step2 Configuration on Sender and Recipient ....................................................377
Installation Overview............................................................................................379
Step1 Configuration on the Machine ...................................................................379
Step2 Configuration on the Computer .................................................................381
14 Authentication and Accounting Features ............................................................383
Overview of Authentication and Accounting Feature ...............................................384
Overview of Authentication Feature.....................................................................384
Overview of Accounting Feature..........................................................................385
Authentication...........................................................................................................386
User Types Managed by Authentication Feature ................................................386
User Roles and Authorization Groups .................................................................386
Types of Authentication .......................................................................................388
Types of Account Administration .........................................................................389
Authentication and Accounting Relationship .......................................................390
Services Controlled by Authentication......................................................................391
Overview..............................................................................................................391
Services Restricted by User ID Authentication ....................................................391
ID Authentication .................................................................................................393
Authentication for Job Flow Sheets and Folders......................................................396
Overview..............................................................................................................396
When the Authentication Feature is Disabled......................................................398
When the Authentication Feature is Enabled ......................................................401
Jobs Manageable by Account Administration ..........................................................404
Configuration for Authentication ...............................................................................407
Installation Overview............................................................................................407
Enabling Authentication .......................................................................................407
Changing the Default Authorization Group Settings ............................................410
10

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents