User - Ricoh PRO C900 Operating Instructions Manual

Security reference
Hide thumbs Also See for PRO C900:
Table of Contents

Advertisement

2. Authentication and its Application
Machine Administrator
This is the administrator who mainly manages the machine's default settings. You can set the machine
so that the default for each function can only be specified by the machine administrator. By making
this setting, you can prevent unauthorized people from changing the settings and allow the machine
to be used securely by its many users.
For instructions on registering the machine administrator, see "Registering the Administrator".
2
Network Administrator
This is the administrator who manages the network settings. You can set the machine so that network
settings such as the IP address and settings for sending and receiving e-mail can only be specified by
the network administrator.
By making this setting, you can prevent unauthorized users from changing the settings and disabling
the machine, and thus ensure correct network operation.
For instructions on registering the network administrator, see "Registering the Administrator".
File Administrator
This is the administrator who manages permission to access stored files. You can specify Auto E-mail
Notification. If you do, alert messages are sent to the registered e-mail addresses when paper jams
occur or the print cartridge runs out of toner. Both the user administrator and machine administrator
can specify Auto E-mail Notification.
For instructions on registering the file administrator, see "Registering the Administrator".
Supervisor
The supervisor can delete an administrator's password and specify a new one. The supervisor cannot
specify defaults or use normal functions. However, if any of the administrators forget their password
and cannot access the machine, the supervisor can provide support.
For instructions on registering the supervisor, see "Supervisor Operations".
• p.27 "Registering the Administrator"
• p.149 "Supervisor Operations"

User

Users are managed using the personal information in the machine's address book.
By enabling user authentication, you can allow only people registered in the address book to use the
machine. Users can be managed in the address book by the user administrator.
For details about registering users in the address book, see "Administrator Tools", General Settings Guide,
or Web Image Monitor Help.
18

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents