3. Configuring User Authentication
This chapter describes what a user can do, how to specify user authentication, and how to log into and
out from the machine as a user.
Users
A user performs normal operations on the machine, such as copying and scanning. Users are managed
using the personal information in the machine's Address Book, and can use only the functions they are
permitted to access by administrators. By enabling user authentication, you can allow only people
registered in the Address Book to use the machine. Users can be managed in the Address Book by the user
administrator. For details about administrator, see p.23 "Administrators". For details about user registration,
see "Registering Names", Network and System Settings Reference or Web Image Monitor Help.
• If user authentication is not possible because of a problem with the hard disk or network, you can use
the machine by accessing it using administrator authentication and disabling user authentication. Do
this if, for instance, you need to use the machine urgently.
3
35