Canon imageRUNNER ADVANCE C5560i III User Manual page 690

Hide thumbs Also See for imageRUNNER ADVANCE C5560i III:
Table of Contents

Advertisement

Managing the Machine
Setting the Privilege Levels
With personal authentication management, you can define the range of available operations by specifying the
role (privilege level) for each user. For example, you can select the Administrator role to allow full access
privileges, the NetworkAdmin role to allow configuration of network-related settings, or the DeviceAdmin role
to allow the configuration of device information settings and the settings for keys and certificates that are
required when using particular functions. By selecting and assigning various privilege levels to administrators,
you can operate more effectively as a team in handling a wide range of machine management tasks.
Setting Usage Restrictions
Personal authentication management enables a user with Administrator privileges to manage the range of
operations that are available to users. The ability to set function restrictions for each user provides you with
more precise control in user management.
Managing Groups of Users
Users can be assigned to groups based on Department ID (Department ID Management), enabling you to check
the total number of printed or scanned pages for each Department ID. You can also set specific limits for each
Department ID, such as a maximum of 500 printed pages or a maximum of 200 copied pages. This function can
help boost cost awareness and provide hints on how to improve your operations.
Optimizing the Settings for Each User
Various settings can be saved for each user and applied at login. Users can create Personal buttons, and they
can specify a Personal folder on the network. It is also possible for the machine to remember passwords once
they have been entered, enabling users to log in again without entering the password.
Associating User Accounts with Keychains for Smooth Operations
When authentication information different from the authentication information used when logging in is
required, the authentication information has to be entered once, but does not need to be entered again
once authentication is successful. This authentication information is called a keychain. Since keychains are
676

Advertisement

Table of Contents
loading

Table of Contents