Authentication And Its Application; Administrators And Users; Administrators - Ricoh C23535 Operating Instructions Manual

Table of Contents

Advertisement

2. Authentication and its

Administrators and Users

When controlling access using the authentication specified by an administrator,
select the machine's administrator, enable the authentication function, and then
use the machine.
The administrators manage access to the allocated functions, and users can use
only the functions they are permitted to access. To enable the authentication
function, the login user name and login password are required in order to use
the machine.
Specify administrator authentication, and then specifying user authentication.
Important
❒ If user authentication is not possible because of a problem with the hard disk
or network, you can use the machine by accessing it using administrator au-
thentication and disabling user authentication. Do this if, for instance, you
need to use the machine urgently.
Reference
For details, see p.37 "Specifying Login User Name and Login Password".

Administrators

There are four types of administrator according to the administered function:
machine administrator, network administrator, file administrator, and user ad-
ministrator.
By sharing the administrative work among different administrators, you can
spread the workload and limit unauthorized operation by a single administra-
tor. You can also specify a supervisor who can change each administrator's pass-
word. Administrators are limited to managing the machine's settings and
controlling user access. so they cannot use functions such as copying and print-
ing. To use such functions, you need to register a user in the address book and
then be authenticated as the user.
Reference
For details, see p.20 "Registering the Administrator".
For details, See p.169 "Operations by the Supervisor".
❖ User Administrator
This is the administrator who manages personal information in the address book.
A user administrator can register/delete users in the address book or change
users' personal information.
Users registered in the address book can also change and delete their own in-
formation. If any of the users forget their password, the user administrator can
delete it and create a new one, allowing the user to access the machine again.
Application
11

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents