
[Web Management Tool] 1-5
function ...........................................................................................................................................11-15
Deleting all files saved in a User Box using the Scan to URL function...........................................11-15
12 Restricting Users from Using this Device
12.1 Overview of User Authentication and Account Track ............................................................... 12-2
User Authentication ..........................................................................................................................12-2
Account Track...................................................................................................................................12-3
Combining user authentication and account track...........................................................................12-3
12.2 Employing the MFP authentication ............................................................................................. 12-5
Overview ...........................................................................................................................................12-5
Configuring basic settings for the user authentication .....................................................................12-5
12.3 Employing the account track function........................................................................................ 12-7
Overview ...........................................................................................................................................12-7
Configuring basic account track settings .........................................................................................12-7
12.4 Employing the Active Directory authentication.......................................................................... 12-9
Overview ...........................................................................................................................................12-9
Configuring basic settings for the Active Directory authentication...................................................12-9
Sending to Your Computer (Scan to Home) ...................................................................................12-11
Using the single sign-on .................................................................................................................12-11
Reinforcing authentication processing when using Active Directory..............................................12-11
12.5 Employing the NTLM authentication......................................................................................... 12-13
Overview .........................................................................................................................................12-13
Configuring basic settings for the NTLM authentication ................................................................12-13
Using the WINS server....................................................................................................................12-15
Using the direct hosting SMB service.............................................................................................12-15
12.6 Employing the LDAP authentication ......................................................................................... 12-16
Overview .........................................................................................................................................12-16
Configuring basic settings for the LDAP authentication .................................................................12-16
Using SSL communication .............................................................................................................12-18
12.7 Sending to your address (Scan to Me)...................................................................................... 12-19
12.8 Sending the download URL to your address (Scan to URL) ................................................... 12-20
12.9 Constructing a single sign-on environment for the SMB transmission................................. 12-21
12.10 Configuring a setting so that a user can log in to this machine using
administrator privileges.............................................................................................................. 12-22
12.11 Setting privileges to use the functions of this machine by user or
account ........................................................................................................................................ 12-23
12.11.1 Restricting available functions by user or account.........................................................................12-23
12.11.2 Specifying the default function permission setting when the external server
authentication is used.....................................................................................................................12-24
12.11.3 Restricting functions available to public users ...............................................................................12-25
12.12 Managing the maximum number of copies by user or account............................................. 12-26
12.13 Limiting the access to destinations for each user................................................................... 12-27
12.13.1 Methods to limit access to destinations .........................................................................................12-27
12.13.2 Managing based on the reference allowed level ............................................................................12-27
Reference Allowed Level.................................................................................................................12-27
Setting the reference allowed level.................................................................................................12-27
12.13.3 Managing based on the reference allowed group ..........................................................................12-28
Reference Allowed Group...............................................................................................................12-28
Assigning a reference allowed group..............................................................................................12-28
12.13.4 Managing based on a combination of the reference allowed level and the
reference allowed group .................................................................................................................12-28
Combining the reference allowed level with the reference allowed group .....................................12-28
Simultaneously setting a reference allowed level and reference allowed
group...............................................................................................................................................12-29
12.14 Changing the function key display pattern by user or account.............................................. 12-30
Overview .........................................................................................................................................12-30
Allowing changing the function key display pattern by user or account ........................................12-30
Selecting a function key display pattern by user ............................................................................12-30
Selecting a function key display pattern by account......................................................................12-31
12.15 Specifying the operations of the ID & Print function ............................................................... 12-32