Authentication And Auditron Administration; Overview Of Authentication; Users Controlled By Authentication; Authenticated Users - Xerox WorkCentre 7132 User Manual

Print copy scan fax email
Hide thumbs Also See for WorkCentre 7132:
Table of Contents

Advertisement

13 Authentication and Auditron
Administration
The machine has a unique Authentication feature that restricts the ability to use
functions, and an Auditron Administration feature that manages the use of each
machine feature.
This chapter contains information for Key Operators on the features used to change the
settings and on the setting procedures.
Overview of Authentication – page 327
Authentication for Job Flow Sheet and Mailbox – page 330
Overview of Auditron Administration – page 345

Overview of Authentication

This section is an overview of the Authentication feature used with the machine.

Users Controlled by Authentication

The following is an explanation about the different user types that are controlled by the
Authentication feature.
Users are classified into the following four types. The Authentication feature restricts
operations according to the user type.
• Key Operators

• Authenticated Users

• Unauthenticated Users
• General Users
Key Operators
These are users who can enter and change system settings.
A Key Operator uses a special user ID called a Key Operator ID.
To enter the Key Operator mode, enter the Key Operator ID into the user ID entry field
on the authentication screen.
Authenticated Users
These are users who are registered with the machine.
When an Authenticated User uses a service that is restricted, the user must enter their
user ID on the authentication screen.
Xerox WorkCentre 7132 User Guide
327

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents