Overview Of Authentication; Users Controlled By Authentication; Types Of Authentication - Fuji Xerox ApeosPort 450 I User Manual

Table of Contents

Advertisement

14 Authentication and Auditron Administration

Overview of Authentication

This section is an overview of the Authentication feature used with the machine.

Users Controlled by Authentication

The following is an explanation about the different user types that are controlled by the
Authentication feature.
Users are classified into the following four types. The Authentication feature restricts
operations according to the user type.
System Administrator
These are users who can enter and change system settings.
A system administrator uses a special user ID called a system administrator ID.
To enter the System Administration mode, enter the system administrator ID into the
14
user ID entry field on the authentication screen.
Authenticated User
These are users who are registered with the machine.
When an authenticated user uses a service that is restricted, the user must enter the
user ID on the authentication screen.
Unauthenticated User
These are users who are not registered with the machine.
An unauthenticated user cannot use services that are restricted.
General Users
These are users who are not permitted to use the machine in the authenticated mode.

Types of Authentication

The following describes the types of authentication method that can be used with the
machine.
Authentication is carried out using an user ID registered on the machine or on a remote
authentication server.
The following three types of authentication are used by the machine depending on
where user information is stored.
Local machine authentication
Local machine authentication uses the user information stored in the machine to
manage authentication.
406
System administrator
Authenticated user
Unauthenticated user
General users

Advertisement

Table of Contents
loading

Table of Contents