Authentication And Auditron Administration; Overview Of Authentication; Users Controlled By Authentication - Xerox WorkCentre 7132 User Manual

Hide thumbs Also See for WorkCentre 7132:
Table of Contents

Advertisement

13 Authentication and Auditron
Administration

Overview of Authentication

Users Controlled by Authentication

Key Operators
Authenticated Users
Xerox WorkCentre 7132 User Guide
Downloaded From ManualsPrinter.com Manuals
The machine has a unique Authentication feature that restricts the ability to use
functions, and an Auditron Administration feature that manages the use of each
machine feature.
This chapter contains information for Key Operators on the features used to change the
settings and on the setting procedures.
Overview of Authentication – page 327
Authentication for Job Flow Sheet and Mailbox – page 330
Overview of Auditron Administration – page 345
This section is an overview of the Authentication feature used with the machine.
The following is an explanation about the different user types that are controlled by the
Authentication feature.
Users are classified into the following four types. The Authentication feature restricts
operations according to the user type.
• Key Operators
• Authenticated Users
• Unauthenticated Users
• General Users
These are users who can enter and change system settings.
A Key Operator uses a special user ID called a Key Operator ID.
To enter the Key Operator mode, enter the Key Operator ID into the user ID entry field
on the authentication screen.
These are users who are registered with the machine.
When an Authenticated User uses a service that is restricted, the user must enter their
user ID on the authentication screen.
327

Advertisement

Table of Contents
loading

Table of Contents