Ricoh AFICIO 2075, AFICIO 2060, AFICIO 2051 User Manual

Page 1
Operating Instructions
Security Reference
Getting Started
Preventing Information Leaks
Preventing Unauthorized Use of Functions and Settings
Enhanced Network Security
Management Based on Authentication and Access Control
Specifying the Administrator/Security Functions
Troubleshooting
Appendix
Read this manual carefully before you use this product and keep it handy for future reference. For safe and correct use, please be sure to read
Page 2
Introduction
This manual describes detailed instructions on the operation and notes about the use of this machine. To get maximum versatility from this machine, all operators are requested to read this manual carefully and follow the instructions. Please keep this manual in a handy place near the machine.
Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licens­es.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its completeness or accuracy. If you have any questions concerning the legality of copying or printing cer­tain items, consult with your legal advisor.
Important
Contents of this manual are subject to change without prior notice. In no event will the company be li­able for direct, indirect, special, incidental, or consequential damages as a result of handling or oper­ating the machine.
Trademarks
®
Microsoft
, Windows® and Windows NT® are registered trademarks of Microsoft Corporation in the
United States and/or other countries.
AppleTalk, EtherTalk, Rendezvous are registered trademarks of Apple Computer, Inc.
PostScript
®
and Acrobat® are registered trademarks of Adobe Systems, Incorporated.
PCL is a registered trademark of Hewlett-Packard Company.
Bluetooth is a Trademark of the Bluetooth SIG, Inc. (Special Interest Group) and licensed to RICOH Company Limited.
Other product names used herein are for identification purposes only and might be trademarks of their respective companies. We disclaim any and all rights to those marks.
The proper names of the Windows operating systems are as follows:
• The product name of Windows
• The product name of Windows
• The product name of Windows
• The product names of Windows Microsoft Microsoft
®
Windows® 2000 Advanced Server
®
Windows® 2000 Server
®
95 is Microsoft® Windows 95.
®
98 is Microsoft® Windows 98.
®
Me is Microsoft® Windows Millennium Edition (Windows Me).
®
2000 are as follows:
Microsoft® Windows® 2000 Professional
®
• The product names of Windows Microsoft
®
Windows® XP Professional
XP are as follows:
Microsoft® Windows® XP Home Edition
• The product names of Windows Server™ 2003 are as follows: Microsoft® Windows ServerTM 2003 Standard Edition Microsoft® Windows ServerTM 2003 Enterprise Edition
®
Microsoft
• The product names of Windows NT Microsoft® Windows NT® Server 4.0 Microsoft
Windows ServerTM 2003 Web Edition
®
4.0 are as follows:
®
Windows NT® Workstation 4.0
Notes
Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.
Page 3
Manuals for This Machine
The following manuals describe the operational procedures of this machine. For particular functions, see the relevant parts of the manual.
Note
Manuals provided are specific to machine type.
Adobe Acrobat Reader is necessary to view the manuals as a PDF file.
Two CD-ROMs are provided:
• CD-ROM 1 “Operating Instructions for Printer/Scanner”
• CD-ROM 2 “Scanner Driver and Document Management Utility”
❖❖❖❖ General Settings Guide
Provides an overview of the machine and describes System Settings (such as Tray Paper Settings), Document Server functions, and troubleshooting. Refer to this manual for Address Book procedures such as registering e-mail addresses and user codes.
❖❖❖❖ Security Reference (this manual)
This manual is for administrators of this machine. It describes security func­tions that the administrators can use to protect data from being tampered, or prevent the machine from unauthorized use. Also refer to this manual for the procedures for registering administrators, as well as setting user and admin­istrator authentication.
❖❖❖❖ Network Guide (PDF file - CD-ROM1)
Provides information about configuring and operating the printer in a net­work environment or using software. This manual covers all models, and therefore contains functions and settings that may not be available for your model. Images, illustrations, functions, and supported operating systems may differ from those of your model.
❖❖❖❖ Copy Reference
Describes operations, functions, and troubleshooting for the machine's copier function.
❖❖❖❖ Printer Reference
Describes system settings, operations, functions, and troubleshooting for the machine's printer function.
❖❖❖❖ Scanner Reference (PDF file - CD-ROM1)
Describes operations, functions, and troubleshooting for the machine's scan­ner function.
i
Page 4
❖❖❖❖ Manuals for DeskTopBinder Lite
DeskTopBinder Lite is a utility included on the CD-ROM labeled “Scanner Driver and Document Management Utility”.
DeskTopBinder Lite Setup Guide (PDF file - CD-ROM2)
Describes installation of, and the operating environment for DeskTop­Binder Lite in detail. This guide can be displayed from the [Setup] display when DeskTopBinder Lite is installed.
DeskTopBinder Lite Introduction Guide (PDF file - CD-ROM2)
Describes operations of DeskTopBinder Lite and provides an overview of its functions. This guide is added to the [Start] menu when DeskTopBinder Lite is installed.
Auto Document Link Guide (PDF file - CD-ROM2)
Describes operations and functions of Auto Document Link installed with DeskTopBinder Lite. This guide is added to the [Start] menu when Desk­TopBinder Lite is installed.
❖❖❖❖ Other manuals
PostScript3 Supplement (PDF file-CD-ROM1)
UNIX Supplement (available from an authorized dealer, or as a PDF file on
our Web site)
ii
Page 5
TABLE OF CONTENTS
Manuals for This Machine......................................................................................i
How to Read This Manual .....................................................................................1
1. Getting Started
Enhanced Security.................................................................................................3
Glossary .....................................................................................................................4
Security Measures Provided by this Machine.....................................................5
Preventing Information Leaks ....................................................................................5
Preventing Unauthorized Operation...........................................................................6
Enhanced Network Security.......................................................................................7
2. Preventing Information Leaks
Printing a Confidential Document........................................................................9
Choosing a Locked Print file ......................................................................................9
Printing a Locked Print File ......................................................................................10
Specifying Access Permission for Stored Files ............................................... 11
Assigning Users and Access Permission for Stored Files .......................................11
Assigning the User and the Access Permission for the User’s Stored Files............13
Specifying Passwords for the Stored Files...............................................................15
Unlocking Files.........................................................................................................16
Preventing Data Leaks Due to Unauthorized Transmission ............................ 17
Specifying Which Users Are Allowed to Send Files.................................................17
Restrictions on Destinations.....................................................................................17
Protecting the Address Book ............................................................................. 19
Address Book Access Permission ...........................................................................19
Encrypting the Data in the Address Book ................................................................21
Overwriting the Data on the Hard Disk ..............................................................23
“Auto Erase Memory Setting”...................................................................................23
“Erase All Memory” ..................................................................................................26
3. Preventing Unauthorized Use of Functions and Settings
Preventing Modification of Machine Settings ...................................................29
Limiting Available Functions..............................................................................30
Specifying Which Functions are Available ...............................................................30
4. Enhanced Network Security
Preventing Unauthorized Access.......................................................................33
Network Settings......................................................................................................33
Access Control.........................................................................................................34
Encrypting Transmitted Passwords...................................................................36
Driver Encryption Key ..............................................................................................36
Group Password for PDF files..................................................................................38
IPP Authentication Password...................................................................................39
iii
Page 6
Protection Using Encryption ..............................................................................40
SSL (Secure Sockets Layer) Encryption..................................................................41
User Settings for SSL (Secure Sockets Layer) ........................................................44
Setting the SSL / TLS Encryption Mode...................................................................45
SNMPv3 Encryption .................................................................................................47
5. Management Based on Authentication and Access Control
The Management Function .................................................................................49
Administrators and Users...................................................................................50
Administrator............................................................................................................50
User..........................................................................................................................51
Enabling Authentication......................................................................................52
Administrator Authentication ....................................................................................52
User Authentication..................................................................................................53
Authentication Information Stored in the Address Book................................. 61
Specifying Authentication Information to Log on......................................................61
If User Authentication Has Been Specified .......................................................63
User Code Authentication (Using the Control Panel)...............................................63
User Code Authentication (Using a Printer Driver) ..................................................63
Login (Using the Control Panel)...............................................................................63
Log Off (Using the Control Panel)............................................................................64
Login (Using a Printer Driver)...................................................................................64
Login (Using Web Image Monitor) ...........................................................................64
Log Off (Using Web Image Monitor) ........................................................................65
Auto Logout..............................................................................................................65
Menu Protect ........................................................................................................66
Menu Protect............................................................................................................66
6. Specifying the Administrator/Security Functions
The Roles of Administrators...............................................................................69
Administrator Authentication .............................................................................71
Administrator Authentication ....................................................................................72
Registering the Administrator...................................................................................74
Logging on Using Administrator Authentication .......................................................75
Logging off Using Administrator Authentication .......................................................76
Changing the Administrator......................................................................................77
Specifying the Extended Security Functions....................................................78
Changing the Extended Security Functions .............................................................78
Settings ....................................................................................................................79
Limiting Machine Operation to Customers Only ..............................................82
Settings ....................................................................................................................82
7. Troubleshooting
Authentication Does Not Work Properly ...........................................................85
A Message Appears.................................................................................................85
Machine Cannot Be Operated..................................................................................87
iv
Page 7
8. Appendix
Operations by the Supervisor.............................................................................89
Logging on as the Supervisor ..................................................................................89
Logging off as the Supervisor ..................................................................................90
Changing the Supervisor..........................................................................................90
Resetting an Administrators Password ...................................................................91
Machine Administrator Settings.........................................................................93
System Settings .......................................................................................................93
Copier Features .......................................................................................................95
Printer Features/Normal Operation..........................................................................95
Scanner Features.....................................................................................................96
Settings via Web Image Monitor ..............................................................................96
Settings via SmartDeviceMonitor for Admin.............................................................98
Network Administrator Settings.........................................................................99
System Settings .......................................................................................................99
Scanner Features...................................................................................................100
Settings via Web Image Monitor ............................................................................100
Settings via SmartDeviceMonitor for Admin...........................................................102
File Administrator Settings...............................................................................103
System Settings .....................................................................................................103
Settings via Web Image Monitor ............................................................................103
Settings via SmartDeviceMonitor for Admin...........................................................104
User Administrator Settings .............................................................................105
System Settings .....................................................................................................105
Settings via Web Image Monitor ............................................................................105
The Available Functions for Using the Files Stored in Document Server .... 106
Settings That Can Be Specified In the Address Book............................................107
User Settings......................................................................................................110
Copier Features .....................................................................................................110
Printer Functions....................................................................................................113
Scanner Features...................................................................................................114
System Settings .....................................................................................................115
Web Image Monitor Setting....................................................................................121
Functions That Require Options ......................................................................131
INDEX....................................................................................................... 132
v
Page 8
vi
Page 9
How to Read This Manual
R
R
Symbols
The following set of symbols is used in this manual.
WARNING:
This symbol indicates a potentially hazardous situation that might result in death or serious injury when you misuse the machine without following the in­structions under this symbol. Be sure to read the instructions, all of which are de­scribed in the Safety Information section.
CAUTION:
This symbol indicates a potentially hazardous situation that might result in mi­nor or moderate injury or property damage that does not involve personal injury when you misuse the machine without following the instructions under this symbol. Be sure to read the instructions, all of which are described in the Safety Information section.
* The statements above are notes for your safety.
Important
If this instruction is not followed, paper might be misfed, originals might be damaged, or data might be lost. Be sure to read this.
Preparation
This symbol indicates information or preparations required prior to operating.
Note
This symbol indicates precautions for operation, or actions to take after abnor­mal operation.
Limitation
This symbol indicates numerical limits, functions that cannot be used together, or conditions in which a particular function cannot be used.
Reference
This symbol indicates a reference.
[]
Keys that appear on the machine's display panel.
[]
Keys and buttons that appear on the computer's display.
{}
Keys built into the machine's control panel.
{}
Keys on the computer's keyboard.
1
Page 10
2
Page 11
1. Getting Started
Enhanced Security
This machine's security function can be enhanced through the management of the machine and its users using the improved authentication functions.
By specifying access limits on the machines functions and the documents and data stored in the machine, you can prevent information leaks and unauthorized access.
Data encryption can prevent unauthorized data access and tampering via the network.
❖❖❖❖ Authentication and Access Limits
Using authentication, administrators manage the machine and its users. To enable authentication, information about both administrators and users must be registered in order to authenticate users via their login user names and passwords. Four types of administrator manage specific areas of machine usage, such as settings and user registration. Access limits for each user are specified by the administrator responsible for user access to machine functions and documents and data stored in the ma­chine.
Reference
For details, see p.69 The Roles of Administrators”.
❖❖❖❖ Encryption Technology
This machine can establish secure communication paths by encrypting trans­mitted data and passwords.
3
Page 12
Getting Started
Glossary
❖❖❖❖ Administrator
1
Administrators manage a specific area of machine usage, such as settings or user registration. There are four types of administrator: user administrator, network adminis­trator, machine administrator, and file administrator. One person can act as more than one type of administrator. Basically, administrators make machine settings and manage the machine; they cannot perform normal operations, such as copying and printing.
❖❖❖❖ User
A user performs normal operations on the machine, such as copying and printing.
❖❖❖❖ File Creator (Owner)
This is a user who can store files in the machine and authorize other users to view, edit, or delete those files.
❖❖❖❖ Registered User
This is a user whose personal information is registered in the address book. The registered user is the user who knows the login user name and password.
❖❖❖❖ Administrator Authentication
Administrators are authenticated by means of the login user name and login password supplied by the administrator when specifying the machines set­tings or accessing the machine over the network.
❖❖❖❖ User Authentication
Users are authenticated by means of the login user name and login password supplied by the user when specifying the machines settings or accessing the machine over the network.
❖❖❖❖ Login
This action is required for administrator authentication and user authentica­tion. Enter your login user name and login password on the machines control panel. A login user name and login password may also be supplied when accessing the machine over the network or using such utilities as Web Image Monitor and SmartDeviceMonitor for Admin.
❖❖❖❖ Logout
This action is required with administrator and user authentication. This ac­tion is required when you have finished using the machine or changing the settings.
4
Page 13
Security Measures Provided by this Machine
Security Measures Provided by this Machine
Preventing Information Leaks
❖❖❖❖ Printing confidential files
Using the printers Locked Print, you can store files in the machine as confi­dential files and then print them. You can print a file using the machines con­trol panel and collect it on the spot to prevent others from seeing it.
Reference
For details, see p.9 Printing a Confidential Document”.
❖❖❖❖ Protecting Stored Files from Unauthorized Access
You can specify who is allowed to use and access scanned files and the files in Document Server. You can prevent activities such as the printing of stored files by unauthorized users.
Reference
For details, see p.11 Specifying Access Permission for Stored Files”.
❖❖❖❖ Protecting Stored Files from Theft
You can specify who is allowed to use and access scanned files and the files in Document Server. You can prevent such activities as the sending and downloading of stored files by unauthorized users.
1
Reference
For details, see p.11 Specifying Access Permission for Stored Files”.
❖❖❖❖ Preventing Data Leaks Due to Unauthorized Transmission
You can specify in the address book which users are allowed to send files us­ing the scanner function. You can also limit the direct entry of destinations to prevent files from being sent to destinations not registered in the address book.
Reference
For details, see p.17 Preventing Data Leaks Due to Unauthorized Trans­mission”.
❖❖❖❖ Protecting Registered Information in the Address Book
You can specify who is allowed to access the data in the address book. You can prevent the data in the address book being used by unregistered users. To protect the data from unauthorized reading, you can also encrypt the data in the address book.
Note
To encrypt the data in the address book, the machine must have the printer
and scanner functions.
5
Page 14
Getting Started
Reference
For details, see p.19 Protecting the Address Book”.
❖❖❖❖ Overwriting the Data on the Hard Disk
1
You can overwrite data on the hard disk.
Reference
For details, see p.23 Overwriting the Data on the Hard Disk”.
Preventing Unauthorized Operation
❖❖❖❖ Preventing Modification or Deletion of Stored Data
You can specify who is allowed to access stored scan files and files stored in Document Server. You can permit selected users who are allowed to access stored files to modify or delete the files.
Reference
For details, see p.11 Specifying Access Permission for Stored Files”.
❖❖❖❖ Preventing Modification of Machine Settings
The machine settings that can be modified depend on the type of administra­tor account. Register the administrators so that users cannot change the administrator set­tings.
Reference
For details, see p.29 Preventing Modification of Machine Settings”.
❖❖❖❖ Limiting Available Functions
To prevent unauthorized operation, you can specify who is allowed to access each of the machines functions.
Reference
For details, see p.30 Limiting Available Functions”.
6
Page 15
Security Measures Provided by this Machine
Enhanced Network Security
❖❖❖❖ Preventing Unauthorized Access
You can limit IP addresses or disable ports to prevent unauthorized access over the network and protect the address book, stored files, and default set­tings.
Reference
For details, see p.33 Preventing Unauthorized Access”.
❖❖❖❖ Encrypting Transmitted Passwords
Prevent login passwords, group passwords for PDF files, and IPP authentica­tion passwords being revealed by encrypting them for transmission. Also, encrypt the login password for administrator authentication and user authentication.
Note
To encrypt transmitted passwords, the machine must have the printer and
scanner functions.
Reference
For details, see p.36 Encrypting Transmitted Passwords”.
❖❖❖❖ Safer Communication Using SSL
When you access the machine using a Web browser or IPP, you can establish encrypted communication using SSL. When you access the machine using an application such as SmartDeviceMonitor for Admin, you can establish en­crypted communication using SNMPv3 or SSL. To protect data from interception, analysis, and tampering, you can install a server certificate in the machine, negotiate a secure connection, and encrypt transmitted data.
1
Note
To establish encrypted communication using SSL, the machine must have
the printer and scanner functions.
Reference
For details, see p.40 Protection Using Encryption”.
7
Page 16
Getting Started
1
8
Page 17
2. Preventing Information Leaks
Printing a Confidential Document
To use this function, the printer/scanner option must be installed.
Depending on the location of the machine, it is difficult to prevent unauthorized persons from viewing prints lying in the machines output trays. When printing confidential documents, use the Locked Print function.
❖❖❖❖ Locked Print
Using the printers Locked Print function, store files in the machine as Locked Print files and then print them from the control panel and retrieve them im­mediately, preventing others from viewing them.
Reference
If user authentication has been enabled, you must enter the login user name and login password using the printer driver. For details see the printer driver Help.
You can perform Locked Print even if user authentication is not enabled. For details see Printer Reference.
Choosing a Locked Print file
Using the printer driver, specify a Locked Print file.
Open the printer driver dialog box.
AAAA
Set [Job type:] to [Locked Print].
BBBB
Click [Details...].
CCCC
Enter the user ID and password.
DDDD
A confirmation message appears.
Note
The user ID and password entered here let you use the Locked Print func-
tion.
To print a Locked Print file, enter the same user ID and password on the
control panel.
Limitation
Enter the user ID using up to 8 alphanumeric characters.
Enter the password using 4 to 8 numbers.
Click [OK].
EEEE
Click [OK].
FFFF
9
Page 18
Preventing Information Leaks
Click [OK].
GGGG
Perform Locked Print.
HHHH
Reference
For details, see the printer driver Help.
2
Printing a Locked Print File
To print a Locked Print file, face the machine and print the file using the control panel.
Preparation
For details about logging on with user authentication, see p.63 Login (Using the Control Panel)”.
For details about logging off with user authentication, see p.64 Log Off (Us­ing the Control Panel)”.
Press the {{{{Printer}}}} key.
AAAA
Press [Locked & Sample Print Job List].
BBBB
Press [
CCCC
Locked Print Job List
Only Locked Print files belonging to the user who has logged on appear.
].
10
Select the Locked Print file to print.
DDDD
Press [Print].
EEEE
Enter the password for the stored file, and then press [OK].
FFFF
Note
Enter the password specified in step
file”.
Press [Yes].
GGGG
on p.9 Choosing a Locked Print
D
Page 19
Specifying Access Permission for Stored Files
Specifying Access Permission for Stored Files
You can specify who is allowed to access stored scan files and files stored in the Document Server.
You can prevent activities such as the printing or sending of stored files by un­authorized users.
❖❖❖❖ Access Permission
To limit the use of stored files, you can specify four types of access permis­sion.
Read-only In addition to checking the content of and in-
formation about stored files, you can also print and send the files.
Edit You can change the print settings for stored
files. This includes permission to view files.
Edit / Delete You can delete stored files.
This includes permission to view and edit files.
Full Control You can specify the user and access permis-
sion.This includes permission to view, edit, and edit / delete files.
2
Note
Files can be stored by any user who is allowed to use the Document Server
or scanner function.
Using Web Image Monitor, you can check the content of stored files. For
details, see the Web Image Monitor Help.
The default access permission for the file creator (owner) is full control”.
❖❖❖❖ Password for Stored Files
Passwords for stored files can be specified by the file creator (owner) or file administrator. You can obtain greater protection against the unauthorized use of files.
Assigning Users and Access Permission for Stored Files
This can be specified by the file creator (owner) or file administrator.
Specify the users and their access permissions for each stored file.
By making this setting, only users granted access permission can access stored files.
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
11
Page 20
Preventing Information Leaks
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Important
If files become inaccessible, reset their access permission as the file creator
(owner). This can also be done by the file administrator. If you want to access a file but do not have access permission, ask the file creator (owner).
Press the {{{{Document Server}}}} key.
2
AAAA
Select the file.
BBBB
Press [File Management].
CCCC
Press [Change Acs. Priv.].
DDDD
12
Press [Program/Change/Delete].
EEEE
Press [New Program].
FFFF
Select the users or groups you want to assign permission to.
GGGG
You can select more than one users.
By pressing [All Users], you can select all the users.
Press [Exit].
HHHH
Page 21
Specifying Access Permission for Stored Files
Select the user who you want to assign an access permission to, and then
IIII
select the permission.
Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Con-
].
trol
Press [Exit].
JJJJ
Press [OK].
KKKK
Press [OK].
LLLL
Assigning the User and the Access Permission for the User’s Stored Files
This can be specified by the file creator (owner) or file administrator.
Specify the users and their access permission to files stored by a particular user.
Only those users granted access permission can access stored files.
This makes the management of access permission easier than it is when permis­sion is specified for each stored file.
2
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Important
If files become inaccessible, be sure to enable the file administrator, and then
reset the access permission for the files in question.
Press the {{{{User Tools/Counter}}}} key.
AAAA BBBB
Press [
System Settings
].
13
Page 22
Preventing Information Leaks
Press [Administrator Tools].
CCCC
2
Press [Address Book Management].
DDDD
If it does not appear, press [TTTTNext].
Select the user or group.
EEEE
Press [Protection].
FFFF
Under "Protect File(s)", press [Program / Change] for "Permissions for Us-
GGGG
ers/Groups".
If it does not appear, press [TTTTNext].
HHHH
Press [
New Program
].
14
Select the users or groups to register.
IIII
You can select more than one users.
By pressing [
Press [Exit].
JJJJ
All Users
], you can select all the users.
Page 23
Specifying Access Permission for Stored Files
Select the user who you want to assign an access permission to, and then
KKKK
select the permission.
Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Con-
].
trol
Press [Exit].
LLLL
Press [OK].
MMMM
Press [Exit].
NNNN
Press the {{{{User Tools/Counter}}}} key.
OOOO
Specifying Passwords for the Stored Files
This can be specified by the file creator (owner) or file administrator.
Specify passwords for the stored files.
Provides increased protection against unauthorized use of files.
2
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Press the {{{{Document Server}}}} key.
AAAA
Select the file.
BBBB
Press [File Management].
CCCC
Press [
DDDD EEEE
FFFF
Change Password
Enter the password using the number keys.
You can use 4 to 8 numbers as the password for the stored file.
Press [Change] at the bottom of the screen.
].
15
Page 24
Preventing Information Leaks
Confirm the password by re-entering it using the number keys.
GGGG
Press [#].
HHHH
Press [OK].
IIII
Press [OK].
JJJJ
2
Unlocking Files
If you specify Enhance File Protection, the file will be locked and become in­accessible if an invalid password is entered ten times. This section explains how to unlock files.
Only the file administrator can unlock files.
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Press the {{{{Document Server}}}} key.
AAAA
Select the file.
BBBB
Press [File Management].
CCCC
Press [Unlock Files].
DDDD
16
Press [Yes].
EEEE
Press [OK].
FFFF
Page 25
Preventing Data Leaks Due to Unauthorized Transmission
Preventing Data Leaks Due to Unauthorized Transmission
If user authentication is specified, the user who has logged on can be designated as the sender to prevent unauthorized access.
You can also limit the direct entry of destinations to prevent files from being sent to destinations not registered in the address book.
Specifying Which Users Are Allowed to Send Files
If user authentication is specified, the user who has logged on is designated as the sender. With this setting, you can prevent unauthorized access. If you have not specified user authentication, see General Settings Guide.
Note
You need to register the e-mail address. See General Settings Guide.
Restrictions on Destinations
This can be specified by the user administrator.
Make the setting to disable the direct entry of e-mail addresses under the scan­ner function.
By making this setting, the destinations can be restricted to addresses registered in the address book.
2
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [System Settings].
BBBB
17
Page 26
Preventing Information Leaks
Press [Administrator Tools].
CCCC
2
Press [Extended Security].
DDDD
Press [On] for “Restrict Use of Destinations”.
EEEE
Note
If you set “Restrict Use of Destinations to [Off], Permit Adding of Desti-
nations appears.
If you set “Permit Adding of Destinations to [On], the user can register
destinations by entering them directly.
If you set “Permit Adding of Destinations to [Off], the user cannot register
destinations by entering them directly.
Press [OK].
FFFF
Press the {{{{User Tools/Counter}}}} key.
GGGG
Reference
This can also be specified using Web Image Monitor or SmartDeviceMon­itor for Admin. For details, see the Help for each application.
18
Page 27
Protecting the Address Book
Protecting the Address Book
You can specify who is allowed to access the data in the address book. By mak­ing this setting, you can prevent the data in the address book being used by un­registered users.
To protect the data from unauthorized reading, you can also encrypt the data in the address book.
Address Book Access Permission
This can be specified by the registered user. The access permission can also be specified by a user granted full control or the user administrator.
You can specify who is allowed to access the data in the address book.
By making this setting, you can prevent the data in the address book being used by unregistered users.
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Press the {{{{User Tools/Counter}}}} key.
AAAA
2
Press [System Settings].
BBBB
Press [Administrator Tools].
CCCC
Press [Address Book Management].
DDDD
If it does not appear, press [TTTTNext].
19
Page 28
Preventing Information Leaks
Select the user or group.
EEEE
2
Press [Protection].
FFFF
Under "Protect Destination", press [Program / Change] for "Permissions for
GGGG
Users/Groups".
Press [
HHHH
IIII
New Program
Select the users or groups to register.
You can select more than one users.
By pressing [All Users], you can select all the users.
].
20
Press [
JJJJ
Select the user who you want to assign an access permission to, and then
KKKK
select the permission.
Select the permission, from [Read-only], [Edit], [Edit / Delete], or [Full Control].
Press [Exit].
LLLL
Exit
].
Page 29
Protecting the Address Book
Press [OK].
MMMM
Press [Exit].
NNNN
Press the {{{{User Tools/Counter}}}} key.
OOOO
Encrypting the Data in the Address Book
This can be specified by the user administrator.
Encrypt the data in the address book.
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Note
To encrypt the data in the address book, the machine must have the printer
and scanner functions.
Encrypting the data in the address book may take a long time.
The time it takes to encrypt the data in the address book depends on the
number of registered users.
The machine cannot be used during encryption.
If you press [Stop] during encryption, the data is not encrypted.
If you press [Stop] during decryption, the data stays encrypted.
2
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [
BBBB
CCCC
DDDD
System Settings
Press [Administrator Tools].
Press [Extended Security].
].
21
Page 30
Preventing Information Leaks
Press [On] for Encrypt Address Book”.
EEEE
2
Press [Change] for [Encryption Key].
FFFF
Enter the encryption key, and then press [OK].
GGGG
Enter the encryption key using up to 32 alphanumeric characters.
Press [Encrypt / Decrypt].
HHHH
Press [Yes].
IIII
Press [Exit].
JJJJ
Press [OK].
KKKK
Press the {{{{User Tools/Counter}}}} key.
LLLL
22
Page 31
Overwriting the Data on the Hard Disk
Overwriting the Data on the Hard Disk
To use this function, the optional DataOverwriteSecurity unit must be installed.
You can overwrite data on the hard disk.
Note
Depending on the hard disk capacity and the method of erasing the data, this
action may take a few hours. The machine cannot be used during this time.
❖❖❖❖ Auto Erase Memory Setting
To erase selected data on the hard disk, specify [Auto Erase Memory Setting].
❖❖❖❖ Erase All Memory
To erase all the data on the hard disk, using [Erase All Memory].
❖❖❖❖ Methods of Erasing the Data
You can select the method of erasing the data from the following: The default is “NSA”.
*1
NSA
*2
DoD
Random Numbers Overwrites the data with random numbers
*1
National Security Agency
*2
Department of Defense
Reference
For details, see the manual supplied with the DataOverwriteSecurity unit.
Overwrites the data on the hard disk twice with random numbers and once with zeros.
Overwrites the data with a number, its com­plement, and random numbers, and then checks the result.
the specified number of times.
You can specify between 1 and 9 as the number of times the data is overwritten with random numbers. The default is 3 times.
2
Auto Erase Memory Setting
This can be specified by the machine administrator.
A document scanned in Copier, Scanner modes, or data sent from a printer driv­er for printing is stored temporarily on the hard disk of your machine.
Even after the job is completed, it remains in the hard disk as temporary data. Auto Erase Memory erases the temporary data on the hard disk by writing over it.
Overwriting starts automatically once the job is completed.
Copier and Printer functions takes priority over the Auto Erase Memory func­tion. If a copy or print job is in progress, overwriting will begin only after that job is completed.
23
Page 32
Preventing Information Leaks
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Press the {{{{User Tools/Counter}}}} key.
AAAA
2
Press [System Settings].
BBBB
Press [Administrator Tools].
CCCC
Press [Auto Erase Memory Setting].
DDDD
If it does not appear, press [TTTTNext].
24
Press [On], and then select the method of erasing the data.
EEEE
Select the method of erasing the data from [NSA], [DoD], or [Random Numbers].
When you select Random Numbers
A Press [Change]. B Enter the number of times that you want to overwrite using the number
keys, and then press [#].
Press [OK].
FFFF
Auto Erase Memory is set.
Important
When Auto Erase Memory is set to "On", temporary data that remained on
the hard disk when Auto Erase Memory was "Off" might not be overwrit­ten.
Note
Should the main power switch of the machine be turned off before over-
writing is completed, the temporary data will remain on the hard disk un­til the main power switch is next turned on and overwriting is resumed.
Page 33
Overwriting the Data on the Hard Disk
If an error occurs before overwriting is completed, turn off the main pow-
er. Turn it on again, and then repeat from step
.
A
If the overwriting method is changed while overwriting is in progress, the
remainder of the temporary data will be overwritten using the method set originally.
Canceling Auto Erase Memory
Follow steps
AAAA
Press [Off].
BBBB
Press [OK].
CCCC
to
in Auto Erase Memory Setting”.
AAAA
DDDD
Auto Erase Memory is disabled.
Note
To set Auto Erase Memory to "On" again, repeat the procedure in “Auto Erase
Memory Setting”.
Types of Data that Can or Cannot Be Overwritten
The following table shows the types of data that can or cannot be overwritten by Auto Erase Memory.
Data overwritten by Auto Erase Memory
Data not overwritten by Aut o Erase Memory
*1
A Sample Print or Locked Print job can only be overwritten after it has been executed.
*2
Data scanned with network TWAIN scanner will not be overwritten by Auto Erase Memory.
*3
A stored document can only be overwritten after it has been printed or deleted from the Document Server.
*4
Data stored in the Address Book can be encrypted for security. For details, see see p.21 Encrypting the Data in the Address Book”.
Copier Copy jobs
Printer Print Jobs
Sample Print/Locked Print Jobs
Spool Printing jobs
Scanner
Documents stored by the user in the Document Server using the Copier, Printer or Scanner functions
Information registered in the Address Book
Counters stored under each user code
*2
Scanned files sent by e-mail
Files sent by Scan to Folder
Documents sent using
DeskTopBinder, the Scan­Router delivery software or a Web browser
*1
*3
*4
2
25
Page 34
Preventing Information Leaks
Erase All Memory
This can be specified by the machine administrator.
You can erase all the data on the hard disk by writing over it. This is useful if you relocate or dispose of your machine.
Preparation
2
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Important
User codes and the counters under each user code, user stamps, printer fonts
downloaded by the user, data stored in the Address Book, network settings, and the SSL Certificate will be overwritten.
Note
Before erasing the hard disk, you can back up user codes, counters for each
user code, and Address Book data using SmartDeviceMonitor for Admin. For details, see SmartDeviceMonitor for Admin Help.
Disconnect communication cables connected to the machine.
AAAA
Press the {{{{User Tools/Counter}}}} key.
BBBB
26
Press [System Settings].
CCCC
Press [Administrator Tools].
DDDD
Press [Erase All Memory].
EEEE
If it does not appear, press [TTTTNext].
Page 35
Select the method of erasing the data.
FFFF
Select the method of erasing the data from [
When you select Random Numbers
Overwriting the Data on the Hard Disk
], [
DoD
], or [
Random Numbers
NSA
].
A Press [ B Enter the number of times that you want to overwrite using the number
keys, and then press [#].
Press [OK].
GGGG
Press [
HHHH IIII
Canceling Erase All Memory
AAAA
Yes
When overwriting is completed, press [Exit], and then turn off the power.
Reference
Before turning the power off, see "Turning On the Power", General Settings Guide.
Important
Should the main power switch of the machine be turned off before Erase
All Memory is completed, overwriting is canceled.
Make sure the main power switch is not turned off during overwriting.
Note
If the main power is turned off when Erase All Memory is in progress,
overwriting will start again when you next turn on the main power.
If an error occurs before overwriting is completed, turn off the main pow-
er. Turn it on again, and then repeat from step
Press [
Cancel
].
Change
].
] while Erase All Memory is in progress.
.
B
2
Press [Yes].
BBBB
Erase All Memory is canceled.
Note
If you stop this before completion, the data is not fully erased. Execute
[
Erase All Memory
Turn off the main power.
CCCC
Note
To resume overwriting after power off, turn on the main power of the ma-
chine, and then repeat the procedure in Erase All Memory”.
] again to erase the data.
27
Page 36
Preventing Information Leaks
2
28
Page 37
3. Preventing Unauthorized
Use of Functions and Settings
Preventing Modification of Machine Settings
The machine settings that can be modified depend on the type of administrator. Users cannot change the administrator settings.
Register the administrators before using the machine.
❖❖❖❖ Type of Administrator
Register the administrator on the machine, and then authenticate the admin­istrator using the administrators login user name and login password. The machine settings that can be modified depend on the type of administrator. To manage the machine, the following types of administrator can be designat­ed:
User Administrator
Network Administrator
File Administrator
Machine Administrator
Reference
For details, see p.69 The Roles of Administrators”.
For details, see p.71 Administrator Authentication”.
For details, see p.93 Machine Administrator Settings”.
For details, see p.99 Network Administrator Settings”.
For details, see p.103 File Administrator Settings”.
For details, see p.105 User Administrator Settings”.
❖❖❖❖ Menu Protect
Use this function to specify the permission level for users to change those set­tings accessible by non-administrators. You can specify Menu Protect for the following settings:
Copier / Document Server
Printer Features
Scanner Features
Reference
For details, see p.105 User Administrator Settings”.
29
Page 38
Preventing Unauthorized Use of Functions and Settings
Limiting Available Functions
To prevent unauthorized operation, you can specify who is allowed to access each of the machines functions.
❖❖❖❖ Available Functions
Specify the available functions from the copier, Document Server, scanner, and printer functions.
3
Specifying Which Functions are Available
This can be specified by the user administrator. Specify the functions available to registered users. By making this setting, you can limit the functions available to users.
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [System Settings].
BBBB
Press [Administrator Tools].
CCCC
30
Press [Address Book Management].
DDDD
If it does not appear, press [TTTTNext].
Select the user.
EEEE
Page 39
Limiting Available Functions
Press [Auth. Info].
FFFF
In [Available Functions], select the functions you want to specify.
GGGG
If the setting to be specified does not appear, press [TTTTNext].
Press [OK].
HHHH
Press [Exit].
IIII
Press the {{{{User Tools/Counter}}}} key.
JJJJ
3
31
Page 40
Preventing Unauthorized Use of Functions and Settings
3
32
Page 41
4. Enhanced Network Security
Preventing Unauthorized Access
You can limit IP addresses or disable ports to prevent unauthorized access over the network and protect the address book, stored files, and default settings.
Network Settings
This can be specified by the network administrator.
Specify whether to enable or disable the function for each protocol.
By making this setting, you can protect the machine, along with its address book, stored files, and default data, from unauthorized access over the network.
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [System Settings].
BBBB
Press [Interface Settings].
CCCC
Press [Effective Protocol].
DDDD
If the setting to be specified does not appear, press [TTTTNext].
33
Page 42
Enhanced Network Security
Press [Invalid] for the protocol you want to disable.
EEEE
Press [OK].
FFFF
Press the {{{{User Tools/Counter}}}} key.
GGGG
Reference
Advanced network settings can be specified using Web Image Monitor. For details, see the Web Image Monitor Help.
4
Access Control
This can be specified by the network administrator.
The machine can control TCP/IP access.
Limit the IP addresses from which access is possible by specifying the access control range.
For example, if you specify the access control range as [192.168.15.16]- [192.168.15.20], the client PC addresses from which access is possible will be from
192.168.15.16 to 192.168.15.20.
Limitation
Using access control, you can limit access involving lpd, rcp/rsh, ftp, diprint,
ipp, Web Image Monitor, SmartDeviceMonitor for Client or DeskTopBinder. You cannot limit the Monitoring of SmartDeviceMonitor for Client.
You cannot limit access involving telnet, or SmartDeviceMonitor for Admin.
Open a Web browser.
AAAA
Enter http://(machine's-address)/ in the address bar to access the machine.
BBBB
Log onto the machine.
CCCC
The network administrator can log on using the appropriate login user name and login password.
Click [Configuration], click [Security], and then click [Access Control].
DDDD
34
The [
Access Control
In [Access Control Range], enter the IP addresses from which access to the ma-
EEEE
chine is permitted.
] page appears.
Page 43
Click [Apply].
FFFF
Access control is set.
Log off from the machine.
GGGG
Reference
For details, see the Web Image Monitor Help.
Preventing Unauthorized Access
4
35
Page 44
Enhanced Network Security
Encrypting Transmitted Passwords
Prevent login passwords, group passwords for PDF files, and IPP authentication passwords being revealed by encrypting them for transmission.
Also, encrypt the login password for administrator authentication and user au­thentication.
❖❖❖❖ Driver Encryption Key
To encrypt the login password, specify the driver encryption key for the driv­er used for the machine and the users computer.
Limitation
The driver encryption key cannot be used under Windows 95/98 SE/Me.
4
❖❖❖❖ Group Passwords for PDF Files
DeskTopBinder Lites PDF Direct Print function allows a PDF group pass­word to be specified to enhance security.
Note
To use PDF direct print, the optional PostScript3 unit must be installed.
❖❖❖❖ Password for IPP Authentication
Using Web Image Monitor, you can encrypt the password for IPP authentica­tion.
Note
You can use Telnet or FTP to manage passwords for IPP authentication, al-
though it is not recommended.
Note
To encrypt transmitted passwords, the machine must have the printer and
scanner functions.
Driver Encryption Key
This can be specified by the network administrator.
Specify the driver encryption key on the machine.
By making this setting, you can encrypt login passwords for transmission to pre­vent them from being analyzed.
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Press the {{{{User Tools/Counter}}}} key.
AAAA
36
Page 45
Encrypting Transmitted Passwords
Press [System Settings].
BBBB
Press [Administrator Tools].
CCCC
Press [Extended Security].
DDDD
For [Driver Encryption Key], press [Change].
EEEE
Enter the driver encryption key, and then press [OK].
FFFF
Enter the driver encryption key using up to 32 alphanumeric characters.
4
Note
The network administrator must give users the driver encryption key
specified on the machine so they can register it on their computers. Make sure to enter the same driver encryption key as that specified on the ma­chine.
Press [OK].
GGGG
Press the {{{{User Tools/Counter}}}} key.
HHHH
Reference
See the printer driver Help.
See the TWAIN driver Help.
37
Page 46
Enhanced Network Security
Group Password for PDF files
This can be specified by the network administrator.
On the machine, specify the group password for PDF files.
By using a PDF group password, you can enhance security and so protect pass­words from being analyzed.
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Press the {{{{User Tools/Counter}}}} key.
4
AAAA
Press [Printer Features].
BBBB
Press [PDF Menu], and then press [PDF Group Password].
CCCC
If it does not appear, press [VVVV].
38
For [Current Password], press [Change].
DDDD
Enter the password, and then press [OK].
EEEE
Enter the group password for PDF files using up to 32 alphanumeric charac­ters.
Press [OK].
FFFF
For [New Password], press [Change].
GGGG
Enter the password, and then press [OK].
HHHH
For [Confirm New Password], press [Change].
IIII
Enter the password and press [OK].
JJJJ
Press [OK].
KKKK
Press the {{{{User Tools/Counter}}}} key.
LLLL
Page 47
Encrypting Transmitted Passwords
Note
The network administrator must give users the group password for PDF
files that is already registered on the machine. The users can then register it in DeskTopBinder on their computers.
Make sure to enter the same character string as that specified on the ma-
chine for the group password for PDF files.
The group password for PDF files can also be specified using Web Image
Monitor. For details, see the Web Image Monitor Help.
IPP Authentication Password
This can be specified by the network administrator.
Specify the IPP authentication passwords for the machine using Web Image Monitor.
By making this setting, you can encrypt IPP authentication passwords for trans­mission to prevent them from being analyzed.
Open a Web browser.
AAAA
Enter http://(machine's-address)/ in the address bar to access the ma-
BBBB
chine.
Log onto the machine.
CCCC
The network administrator can log on. Enter the login user name and login password.
4
Click [Configuration], click [Security], and then click [IPP Authentication].
DDDD
The [IPP Authentication] page appears.
Select [DIGEST] from the [Authentication] list.
EEEE
Note
When using the IPP port under Windows XP or Windows Server 2003, you
can use the operating systems standard IPP port.
Enter the user name in the [User Name] box.
FFFF
Enter the password in the [Password] box.
GGGG
Click [Apply].
HHHH
IPP authentication is specified.
Log off from the machine.
IIII
39
Page 48
Enhanced Network Security
Protection Using Encryption
When you access the machine using a Web browser or IPP, you can establish en­crypted communication using SSL. When you access the machine using an ap­plication such as SmartDeviceMonitor for Admin, you can establish encrypted communication using SNMPv3 or SSL.
To protect data from interception, analysis, and tampering, you can install a server certificate in the machine, negotiate a secure connection, and encrypt transmitted data.
❖❖❖❖ SSL (Secure Sockets Layer)
4
40
AFN001S
A To access the machine from a user’s computer, request for the SSL server
certificate and public key.
B The server certificate and public key are sent from the machine to the us-
ers computer.
C Using the public key, encrypt the data for transmission.
D The encrypted data is sent to the machine.
E The encrypted data is decrypted using the private key.
Note
To establish encrypted communication using SSL, the machine must have
the printer and scanner functions.
Page 49
Protection Using Encryption
SSL (Secure Sockets Layer) Encryption
This can be specified by the network administrator.
To protect the communication path and establish encrypted communication, create and install the server certificate.
There are two ways of installing a server certificate: create and install a self-cer­tificate using the machine, or request a certificate from a certificate authority and install it.
❖❖❖❖ Configuration flow (self-signed certificate)
A Creating and installing the server certificate
Install the server certificate using Web Image Monitor.
B Enabling SSL
Enable the [SSL/TLS] setting using Web Image Monitor.
❖❖❖❖ Configuration flow (certificate issued by a certificate authority)
A Creating the server certificate
Create the server certificate using Web Image Monitor. The application procedure after creating the certificate depends on the cer­tificate authority. Follow the procedure specified by the certificate author­ity.
B Installing the server certificate
Install the server certificate using Web Image Monitor.
Enabling SSL
C
Enable the [SSL/TLS] setting using Web Image Monitor. Creating and Installing the Server Certificate (Self-Signed Certificate) Create and install the server certificate using Web Image Monitor.
4
Creating and Installing the Self-Signed Certificate
Create and install the server certificate using Web Image Monitor.
This section explains the use of a self-certificate as the server certificate.
Open a Web browser.
AAAA
Enter http://(machine's-address)/ in the address bar to access the printer.
BBBB
Log onto the machine.
CCCC
The network administrator can log on.
Enter the login user name and login password.
DDDD EEEE
Click [
Click [
Configuration
Create
], click [
].
Security
], and then click [
Certificates
].
41
Page 50
Enhanced Network Security
Make the necessary settings.
FFFF
Reference
For details about the displayed items and selectable items, see Web Image Monitor Help.
Click [OK].
GGGG
The setting is changed.
Click [OK].
HHHH
A security warning dialog box appears.
Check the details, and then click [OK].
IIII
[Installed] appears under [Certificate Status] to show that a server certificate for
4
the printer has been installed.
Log off from the machine.
JJJJ
Note
Click [Delete] to delete the server certificate from the machine.
Creating the Server Certificate (Certificate Issued by a Certificate Authority)
Create the server certificate using Web Image Monitor.
This section explains the use of a certificate issued by a certificate authority as the server certificate.
42
Open a Web browser.
AAAA
Enter http://(machine's-address)/ in the address bar to access the printer.
BBBB
Log onto the machine.
CCCC
The network administrator can log on.
Enter the login user name and login password.
Click [Configuration], click [Security], and then click [Certificates].
DDDD
The [Certificates] page appears.
Click [Request].
EEEE
Make the necessary settings.
FFFF
Reference
For details about the displayed items and selectable items, see Web Image Monitor Help.
Page 51
Protection Using Encryption
Click [OK].
GGGG
[
Requesting
Quoting the character string displayed in [Certificate Request Contents:], apply to the certificate authority for a certificate.
Log off from the machine.
HHHH
Apply to the certificate authority for the server certificate.
IIII
The application procedure depends on the certificate authority. For details, contact the certificate authority.
When applying, use the data created with Web Image Monitor.
Note
Using Web Image Monitor, you can create the contents of the server certif-
icate but you cannot send the application.
Click [Cancel Request] to cancel the request for the server certificate.
Installing the Server Certificate (Certificate Issued by a Certificate Authority)
Install the server certificate using Web Image Monitor.
This section explains the use of a certificate issued by a certificate authority as the server certificate.
Enter the server certificate contents issued by the certificate authority.
] appears for [
Certificate Status
] in the [
Certificates
] area.
4
Open a Web browser.
AAAA
Enter http://(machine's-address)/ in the address bar to access the printer.
BBBB
Log onto the machine.
CCCC
The network administrator can log on.
Enter the login user name and login password.
Click [
DDDD
EEEE FFFF
GGGG
Configuration
The [
Certificates
Click [Install].
Enter the contents of the server certificate.
In the [
Certificate Request
ceived from the certificate authority.
Reference
For details about the displayed items and selectable items, see Web Image Monitor Help.
Click [OK].
[Installed] appears under [Certificate Status] to show that a server certificate for
the machine has been installed.
], click [
] page appears.
Security
] box, enter the contents of the server certificate re-
], and then click [
Certificates
].
43
Page 52
Enhanced Network Security
Log off from the machine.
HHHH
Enabling SSL
After installing the server certificate in the machine, enable the SSL setting.
This procedure is used for a self-signed certificate or a certificate issued by a cer­tificate authority.
Open a Web browser.
AAAA
Enter http://(machine's-address)/ in the address bar to access the printer.
BBBB
Log onto the machine.
CCCC
4
The network administrator can log on.
Enter the login user name and login password.
Click [
DDDD
EEEE FFFF
GGGG
Configuration
The [SSL/TLS] page appears.
Click [Enable] for [SSL/TLS].
Click [Apply].
The SSL setting is enabled.
Log off from the machine.
Note
If you set [Permit SSL / TLS Communication] to [Ciphertext Only], enter “ht-
tps://(machine's address)/ to access the machine.
], click [
Security
], and then click [
SSL/TLS
].
User Settings for SSL (Secure Sockets Layer)
If you have installed a server certificate and enabled SSL (Secure Sockets Layer), you need to install the certificate on the users computer.
The network administrator must explain the procedure for installing the certifi­cate to users.
If a warning dialog box appears while accessing the machine using the Web browser or IPP, start the Certificate Import Wizard and install a certificate.
When the [Security Alert] dialog box appears, click [View Certificate].
AAAA
The [Certificate] dialog box appears.
To be able to respond to inquiries from users about such problems as expiry of the certificate, check the contents of the certificate.
44
On the [
BBBB
Certificate Import Wizard starts.
General
] tab, click [
Install Certificate...
].
Page 53
Protection Using Encryption
Install the certificate by following the Certificate Import Wizard instruc-
CCCC
tions.
Note
For details about how to install the certificate, see the Web browser Help.
If a certificate issued by a certificate authority is installed in the printer,
confirm the certificate store location with the certificate authority.
Reference
For details about where to store the certificate when accessing the machine using IPP, see the SmartDeviceMonitor for Client Help.
Setting the SSL / TLS Encryption Mode
By specifying the SSL/TLS encrypted communication mode, you can change the security level.
❖❖❖❖ Encrypted Communication Mode
Using the encrypted communication mode, you can specify encrypted com­munication.
Ciphertext Only Allows encrypted communication only.
If encryption is not possible, the machine does not communicate.
Ciphertext Priority Performs encrypted communication if en-
Ciphertext / Clear Text Communicates with or without encryption,
cryption is possible.
If encryption is not possible, the machine communicates without it.
according to the setting.
4
Setting the SSL / TLS Encryption Mode
This can be specified by the network administrator or machine administrator.
After installing the server certificate, specify the SSL/TLS encrypted communi­cation mode. By making this setting, you can change the security level.
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Press the {{{{User Tools/Counter}}}} key.
AAAA
45
Page 54
Enhanced Network Security
Press [System Settings].
BBBB
Press [Interface Settings].
CCCC
4
Press [Permit SSL / TLS Communication]
DDDD
If it does not appear, press [TTTTNext].
Select the encrypted communication mode.
EEEE
Select [Ciphertext Only], [Ciphertext Priority], or [Ciphertext / Clear Text] as the en­crypted communication mode.
46
Press [OK].
FFFF
Press the {{{{User Tools/Counter}}}} key.
GGGG
Note
The SSL/TLS encrypted communication mode can also be specified using
Web Image Monitor. For details, see the Web Image Monitor Help.
Page 55
Protection Using Encryption
SNMPv3 Encryption
This can be specified by the network administrator.
When using SmartDeviceMonitor for Admin or another application to make various settings, you can encrypt the data transmitted.
By making this setting, you can protect data from being tampered with.
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [System Settings].
BBBB
Press [Interface Settings].
CCCC
4
Press [Permit SNMP V3 Communication].
DDDD
If it does not appear, press [TTTTNext].
Press [Encryption Only].
EEEE
Press [OK].
FFFF
Press the {{{{User Tools/Counter}}}} key.
GGGG
Note
To use SmartDeviceMonitor for Admin for encrypting the data for speci-
fying settings, you need to specify the network administrator’s [Encryption Password] setting and [Encryption Key] in [SNMP Authentication Information] in SmartDeviceMonitor for Admin, in addition to specifying [Permit SNMP V3 Communication] on the machine.
If the machine does not have the printer or scanner function, or if network
administrators [Encryption Password] setting is not specified, the data for transmission may not be encrypted or sent.
47
Page 56
Enhanced Network Security
Reference
For details about specifying the network administrators [Encryption Pass- word] setting, see p.74 Registering the Administrator”.
For details about specifying [Encryption Key] in SmartDeviceMonitor for Admin, see the SmartDeviceMonitor for Admin Help.
4
48
Page 57
5.
Management Based on
Authentication and Access Control
The Management Function
The machine has an authentication function requiring a login user name and login password. By using the authentication function, you can specify access limits for individual users and groups of users. Using access limits, you can not only limit the machines available functions but also protect the machine settings and files and data stored in the machine.
Important
If you have enabled [Administrator Authentication Management], make sure not to
forget the administrator login user name and login password. If an adminis­trator login user name or login password is forgotten, a new password must be specified using the supervisors authority.
Be sure not to forget the supervisor login user name and login password. If
you do forget them, a service representative will to have to return the ma­chine to its default state. This will result in all data in the machine being lost and the service call may not be free of charge.
Reference
For details, see p.89 Operations by the Supervisor”.
49
Page 58
Management Based on Authentication and Access Control
Administrators and Users
When controlling access using the authentication specified by an administrator, select the machines administrator, enable the authentication function, and then use the machine.
The administrators manage access to the allocated functions, and users can use only the functions they are permitted to access. To enable the authentication function, the login user name and login password are required in order to use the machine.
When specifying user authentication, specify administrator authentication as well.
Important
If user authentication is not possible because of a problem with the hard disk
or network, you can use the machine by accessing it using administrator au­thentication and disabling user authentication. Do this if, for instance, you
5
need to use the machine urgently. For details, see the Web Image Monitor Help.
Administrator
There are four types of administrator according to the administered function: machine administrator, network administrator, file administrator, and user ad­ministrator.
By sharing the administrative work among different administrators, you can spread the workload and limit unauthorized operation by a single administra­tor.
Administrators are limited to managing the machines settings and access limits, so user authentication is required to use such functions as copying and printing.
Note
One person can act as more than one type of administrator.
Reference
For details, see p.69 The Roles of Administrators”.
For details, see p.74 Registering the Administrator”.
50
Page 59
Administrators and Users
User
Users are managed using the personal information registered in the machine’s address book.
By enabling user authentication, you can allow only people registered in the ad­dress book to use the machine. Users can be registered in the address book by the user administrator or registered user. In addition to registering users with the machines control panel, you can register them using SmartDeviceMonitor for Admin or Web Image Monitor.
Note
Users can be registered only by a user administrator, using SmartDeviceMon-
itor for Admin or Web Image Monitor.
Reference
For details about registering users in the address book, see General Settings Guide, the SmartDeviceMonitor for Admin Help, or the Web Image Monitor
Help.
5
51
Page 60
Management Based on Authentication and Access Control
Enabling Authentication
To control administrators and users access to the machine, perform administra­tor authentication and user authentication using login user names and login passwords. To perform authentication, the authentication function must be en­abled.
Note
To specify authentication, the administrator must be registered.
Reference
For details, see p.74 Registering the Administrator”.
Administrator Authentication
To use administrator authentication, enable [Administrator Authentication Manage-
5
ment] on the control panel.
Important
If you have enabled [Administrator Authentication Management], make sure not to
forget the administrator login user name and login password. If an adminis­trator login user name or login password is forgotten, a new password must be specified using the supervisors authority.
Reference
For details, see p.89 Operations by the Supervisor”.
Specifying Administrator Authentication Management
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [System Settings].
BBBB
Press [Administrator Tools].
CCCC
Press [Administrator Authentication Management].
DDDD
Press the [User Management], [Machine Management], [Network Management], or
EEEE
[File Management] key to select which settings to manage.
52
Page 61
Enabling Authentication
Set "Admin. Authentication" to [On].
FFFF
[Available Settings] appears.
Select the settings to manage from "Available Settings".
GGGG
Note
To specify administrator authentication for more than one category, repeat
steps
to G.
E
Press [OK].
HHHH
Press the {{{{User Tools/Counter}}}} key.
IIII
User Authentication
There are four types of user authentication method: user code authentication, basic authentication, Windows authentication, and LDAP authentication. To use user authentication, select an authentication method on the control panel, and then make the required settings for the authentication. The settings depend on the authentication method.
5
Important
When using Windows authentication or LDAP authentication, keep in mind
that if you edit an authenticated users e-mail address or any of the other data that is automatically stored after successful authentication, the edited data may be overwritten when it is reacquired at the next authentication.
Note
User code authentication is used for authenticating on the basis of the user
code, and basic authentication, Windows authentication, and LDAP authen­tication are used for authenticating individual users.
You cannot use more than one authentication method at the same time.
User authentication can also be specified via Web Image Monitor. For details
see the Web Image Monitor Help.
53
Page 62
Management Based on Authentication and Access Control
User Code Authentication
This is an authentication method for limiting access to functions according to the user code. The same user code can be used by more than one user. For details about specifying user codes, see General Settings Guide.
Reference
For details about specifying the user code for the printer driver, see Printer Reference or the printer driver Help.
For details about specifying the TWAIN driver user code, see the TWAIN driver Help.
Specifying User Code Authentication
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [System Settings].
5
BBBB
Press [Administrator Tools].
CCCC
54
Press [User Authentication Management].
DDDD
Select [User Code Authentication].
EEEE
Note
If you do not want to use user authentication management, select [Off]
Select which of the machines functions you want to limit.
FFFF
Press [OK].
GGGG
Press the {{{{User Tools/Counter}}}} key.
HHHH
Page 63
Enabling Authentication
Basic Authentication
Specify this authentication when using the machines address book to authenti­cate for each user. Using basic authentication, you can not only manage the ma­chines available functions but also limit access to stored files and to the personal data in the address book.
Specifying Basic Authentication
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [System Settings].
BBBB
5
Press [
CCCC DDDD EEEE
FFFF
GGGG
Administrator Tools
Press [User Authentication Management].
Select [Basic Authentication].
Note
If you do not want to use user authentication management, select [
Select the "Printer Job Auth." level.
Note
If you select [All], you cannot print using a printer driver or a device that
does not support authentication. To also print under an environment that does not support authentication, select [
Press [OK].
].
].
Simple
Off
].
Press the {{{{User Tools/Counter}}}} key.
HHHH
55
Page 64
Management Based on Authentication and Access Control
Windows Authentication
Specify this authentication when using the Windows domain controller to au­thenticate users who have their accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the directory server. Under Windows authentication, you can specify the access limit for each group regis­tered in the directory server.
❖❖❖❖ Operational Requirements for Windows Authentication
To specify Windows authentication, the following requirements must be met:
The machine has the printer and scanner functions.
A domain controller has been set up in a designated domain.
This function is supported by the operating systems listed below. NTLM
authentication is used for Windows authentication. To obtain user infor­mation when running Active Directory, use LDAP. For this to be possible,
5
the version of Windows being used must support TLSv1.
Windows NT 4.0 Server
Windows 2000 Server
Windows Server 2003
Limitation
Users managed outside the domain are subject to user authentication, but
they cannot obtain items such as e-mail addresses.
With Active Directory, you can authenticate users and obtain user informa-
tion. Under Windows NT 4.0 domain controller, you can only authenticate users.
If you can obtain user information, the sender’s address (From:) is fixed to
prevent unauthorized access when sending e-mails under the scanner func­tion.
Note
Enter the login password correctly, keeping in mind that it is case-sensitive.
In a network environment with a WINS server, where other networks can be
accessed via a router, you must specify WINS.
56
Page 65
Enabling Authentication
Specifying Windows Authentication
Note
Under Windows authentication, the machine and domain controller commu-
nicate using SSL, so you need to create a server certificate for the domain con­troller. For details about creating the certificate, see p.58 Creating the Server Certificate”.
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [System Settings].
BBBB
Press [Administrator Tools].
CCCC
Press [User Authentication Management].
DDDD
Select [Windows Authentication].
EEEE
Note
If you do not want to use user authentication management, select [Off].
Press [Change] for Domain Name, enter the name of the domain controller
FFFF
to be authenticated, and then press [OK].
Select the "Printer Job Auth." level.
GGGG
5
57
Page 66
Management Based on Authentication and Access Control
Note
If you select [All], you cannot print using a printer driver or a device that
does not support authentication. To also print under an environment that does not support authentication, select [Simple].
If global groups have been registered:
If global groups have been registered, you can limit the use of functions for each global group.
You need to create global groups in the Windows server in advance and reg­ister in each group the users to be authenticated.
You also need to register in the machine the functions available to the global group members.
A Under Group, press [Program / Change], and then press [*Not Pro-
grammed].
5
If the setting to be specified does not appear, press [TTTTNext].
B Press [Change], and then enter the group name. C Select which of the machines functions you want to limit. D Press [OK].
Press [OK].
HHHH
Press the {{{{User Tools/Counter}}}} key.
IIII
----Creating the Server Certificate
This section explains how to create a Windows certificate for authentication. The procedure given uses Windows 2000 as an example.
Note
Before you can create a certificate, you need to install Internet Information
Service (IIS).
A In [Control Panel], click [Add/Remove Programs].
B Click [Add/Remove Windows Components] and install [Certificates Service].
C On the [Start] menu, point to [Programs], [Administrative tools], and then click
[Internet Information Service].
D Right-click [Default Web Site] and click [Properties].
E Click the [Directory Security] tab.
F Click [Server Certificate...] in [Secure Communication] at the bottom of the dialog
box.
G Follow Web Server Certificates Wizards to create and install the server certif-
icate.
58
Page 67
Enabling Authentication
LDAP Authentication
Specify this authentication when using the LDAP server to authenticate users who have their accounts on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server. The address book stored in the LDAP server can be downloaded to the machine, enabling user authentica­tion without first using the machine to register individual settings in the address book.
Limitation
To use LDAP authentication, the network configuration must allow the ma-
chine to detect the presence of the LDAP server.
SSL communication is used for LDAP authentication, so the machine must
have the printer and scanner functions.
To use LDAP authentication you need to register the LDAP server in the ma-
chine. For details about registration, see Network Guide.
Enter the user’s login user name using up to 32 characters and login password
using up to 128 characters.
Enter the administrator’s login user name and login password using up to 32
characters for each.
Note
If the LDAP server is Active Directory, the login user name is specified as
username@domainname. However, you can omit the domain name by do- ing the following: On the Windows server’s [Start] menu, select [Programs], [Administrative tools], [Active Directory Domains and Trusts]; then, on the [Action] menu, select [Properties]; and then, in [Active Directory Domains and Trusts Prop-
erties], add the UPN suffix.
5
Specifying LDAP Authentication
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [System Settings].
BBBB
Press [Administrator Tools].
CCCC
Press [User Authentication Management].
DDDD
59
Page 68
Management Based on Authentication and Access Control
Select [LDAP Authentication].
EEEE
Note
If you do not want to use user authentication management, select [Off].
Select the LDAP server to be used for LDAP authentication.
FFFF
5
Select the "Printer Job Auth." level.
GGGG
Note
If you select [All], you cannot print using a printer driver or a device that
does not support authentication. To also print under an environment that does not support authentication, select [Simple].
Enter the login name attribute in the [Login Name Attribute] box.
HHHH
If it does not appear, press [TTTTNext
Note
The default login name attribute for Active Directory is “userPrincipal-
Name”.
Enter the unique attribute in the [Unique Attribute] box.
IIII
Note
The default unique attribute for Active Directory is objectGUID”.
Press [OK].
JJJJ
Press the {{{{User Tools/Counter}}}} key
KKKK
].
60
Page 69
Authentication Information Stored in the Address Book
Authentication Information Stored in the Address Book
The authentication information (user name and password) for SMTP authenti­cation, folder authentication, and LDAP authentication can be made the same as the login authentication information for user authentication management.
If you do not want to make the authentication information the same as the login information for user authentication management, see General Settings Guide.
Preparation
For details about logging on using administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
You need to register a user in the address book. For details about the address book, see General Settings Guide.
Specifying Authentication Information to Log on
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [System Settings].
BBBB
5
Press [Administrator Tools].
CCCC
Press [Address Book Management].
DDDD
If the setting to be specified does not appear, press [TTTTNext].
Select the user or group.
EEEE
Press [Auth. Info].
FFFF
Select [Use Auth. Info at Login] in “SMTP Authentication”.
GGGG
If the setting to be specified does not appear, press [TTTTNext].
Limitation
When using thentication, or LDAP Authentication, a user name other than “other or HIDE***” must be specified. The symbol “***” represents any character.
To use [Use Auth. Info at Login] for SMTP authentication, a login password
up to 64 characters in length must be specified.
Note
For folder authentication, select [Use Auth. Info at Login] in “Folder Authen-
tication”.
For LDAP authentication, select [Use Auth. Info at Login] in “LDAP Authen-
tication”.
[Use Auth. Info at Login]
for SMTP Authentication”, “Folder Au-
61
Page 70
Management Based on Authentication and Access Control
Press [OK].
HHHH
Press [Exit].
IIII
Press the {{{{User Tools/Counter}}}} key.
JJJJ
5
62
Page 71
If User Authentication Has Been Specified
If User Authentication Has Been Specified
When user authentication (User Code Authentication, Basic Authentication, Windows Authentication, or LDAP Authentication) is set, the authentication screen is displayed. Unless a valid user name and password are entered, opera­tions are not possible with the machine. Log on to operate the machine, and log off when you are finished operations. Be sure to log off to prevent unauthorized users from using the machine.
Note
Consult the User Administrator about your login user name, password, and
user code.
For user code authentication, enter a number registered in the address book
as [User Code].
User Code Authentication (Using the Control Panel)
When user authentication is set, the following screen appears.
Enter a user code (eight digit), and then press [#].
User Code Authentication (Using a Printer Driver)
When user authentication is set, specify the user code in the printer properties of a printer driver. For details, see the printer driver Help.
Login (Using the Control Panel)
Follow the procedure below to log on when Basic Authentication, Windows Au­thentication, or LDAP Authentication is set. Follow the procedure below to log on when basic authentication, Windows authentication, or LDAP authentication is set.
Press [Enter] for [Login User Name].
AAAA
5
Enter a login user name, and then press [OK].
BBBB
63
Page 72
Management Based on Authentication and Access Control
Press [Enter] for [Login Password].
CCCC
Enter a login password, and then press [OK].
DDDD
Press [Login].
EEEE
When the user is authenticated, the screen for the function you are using ap­pears.
Log Off (Using the Control Panel)
Follow the procedure below to log off when Basic Authentication, Windows Au­thentication, or LDAP Authentication is set.
Press {{{{User Tools / Counter}}}}.
AAAA
Press [Logout].
BBBB
5
Press [Yes].
CCCC
Press {{{{User Tools / Counter}}}}.
DDDD
Login (Using a Printer Driver)
When Basic Authentication, Windows Authentication, or LDAP Authentication is set, make encryption settings in the printer properties of a printer driver, and then specify a login user name and password. For details, see the printer driver Help.
Note
When logged on using a printer driver, logging off is not required.
Login (Using Web Image Monitor)
Follow the procedure below to log on when user authentication is set.
Click [Login].
AAAA
Enter a login user name and password, and then click [OK].
BBBB
Note
For user code authentication, enter a user code in [User Name], and then
click [OK].
64
The procedure may differ depending on the Web browser used.
Page 73
If User Authentication Has Been Specified
Log Off (Using Web Image Monitor)
Click [Logout] to log off.
AAAA
Note
Delete the cache memory in the Web browser after logging off.
Auto Logout
When using user authentication management, the machine automatically logs you off if you do not use the control panel within a given time. This feature is called Auto Logout. Specify how long the machine is to wait before perform­ing Auto Logout.
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [System Settings].
BBBB
Press [Timer Settings].
CCCC
5
Press [Auto Logout Timer].
DDDD
If the setting to be specified does not appear, press [TTTTNext].
Select [On], and then enter “10” to “999” (seconds) using the number keys.
EEEE
Note
If you do not want to specify [Auto Logout Timer], select [Off].
Press [OK].
FFFF
Press the {{{{User Tools/Counter}}}} key.
GGGG
65
Page 74
Management Based on Authentication and Access Control
Menu Protect
The administrator can also limit users access permission to the machines set­tings. The machines System Settings menu and the printers regular menus can be locked so they cannot be changed. This function is also effective when man­agement is not based on user authentication.
Note
To change the menu protect setting, you must first enable administrator au-
thentication.
Reference
For details about the menu protect level for each function, see p.105 “User Administrator Settings”.
Menu Protect
5
You can set menu protect to [Off], [Level 1], or [Level 2]. If you set it to [Off], no menu protect limitation is applied. To limit access to the fullest extent, select [Level 2].
Copying Functions
Note
To specify [Menu Protect] in [Copier / Document Server Features], set [Machine Man-
agement] to [On] in [Administrator Authentication Management] in [Administrator Tools] in [System Settings].
66
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [Copier / Document Server Features].
BBBB
Press [Administrator Tools].
CCCC
Press [Menu Protect].
DDDD
Select the menu protect level, and then press [OK].
EEEE
Page 75
Menu Protect
Press the {{{{User Tools/Counter}}}} key.
FFFF
Printer Functions
Note
To specify [Menu Protect] in [Printer Features], set [Machine Management] to [On]
in [Administrator Authentication Management] in [Administrator Tools] in [System Settings].
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [Printer Features].
BBBB
Press [Maintenance].
CCCC
Press [Menu Protect].
DDDD
Select the menu protect level, and then press [OK].
EEEE
5
Press the {{{{User Tools/Counter}}}} key.
FFFF
Scanner Functions
Note
To specify [Menu Protect] in [Scanner Features], set [Machine Management] to [On]
in [Administrator Authentication Management] in [Administrator Tools] in [System Settings].
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [Scanner Features].
BBBB
67
Page 76
Management Based on Authentication and Access Control
Press [Administrator Tools].
CCCC
Press [Menu Protect].
DDDD
Select the menu protect level, and then press [OK].
EEEE
Press the {{{{User Tools/Counter}}}} key.
FFFF
5
68
Page 77
6.
Specifying the
Administrator/Security Functions
The Roles of Administrators
By limiting the functions available to each user, you can protect the data in the machine from leaks and from being tampered with or deleted. The administra­tors each manage the access limits to the functions they are responsible for.
There are four types of administrator, as shown below. You can also specify a su­pervisor who can change each administrators password.
Machine Administrator
Network Administrator
File Administrator
User Administrator
Supervisor
Register the administrators and supervisor separately from the users registered in the address book. Users registered in the address book cannot be specified as administrators.
Reference
For details, see p.74 Registering the Administrator”.
❖❖❖❖ Machine Administrator
This is the administrator who mainly manages the machines default settings. You can set the machine so that the default for each function can only be spec­ified by the machine administrator. By making this setting, you can prevent unauthorized people from changing the settings and allow the machine to be used securely by its many users.
❖❖❖❖ Network Administrator
This is the administrator who manages the network settings. You can set the machine so that network settings such as the IP address and settings for send­ing and receiving e-mail can only be specified by the network administrator. By making this setting, you can prevent unauthorized users from changing the settings and disabling the machine, and thus ensure correct network op­eration.
❖❖❖❖ File Administrator
This is the administrator who manages permission to access stored files. You can specify passwords to allow only registered and permitted users to view and edit files stored in Document Server. By making this setting, you can pre­vent data leaks and tampering due to unauthorized users viewing and using the registered data.
69
Page 78
Specifying the Administrator/Security Functions
❖❖❖❖ User Administrator
This is the administrator who manages personal information in the address book. A user administrator can register/delete users in the address book or change users personal information. Users registered in the address book can also change and delete their own in­formation. If any of the users forget their password, the user administrator can delete it and create a new one, allowing the user to access the machine again.
❖❖❖❖ Supervisor
The supervisor can delete an administrators password and specify a new one. The supervisor cannot specify defaults or use normal functions. Howev­er, if any of the administrators forget their password and cannot access the machine, the supervisor can provide support.
Reference
See p.89 Operations by the Supervisor”.
6
70
Page 79
Administrator Authentication
Administrator Authentication
Administrators are handled differently from the users registered in the address book. When registering an administrator, you cannot use a login user name and login password already registered in the address book. Windows Authentica­tion and LDAP Authentication are not performed for an administrator, so an ad­ministrator can log on even if the server is unreachable because of a network problem.
Each administrator is identified by a login user name and login password. One person can act as more than one type of administrator if multiple administrator authority is granted to a single login user name and login password.
You can specify the login user name, login password, and encryption password for each administrator.
The encryption password is a password for performing encryption when speci­fying settings using Web Image Monitor or SmartDeviceMonitor for Admin.
The password registered in the machine must be entered when using applica­tions such as SmartDeviceMonitor for Admin.
Note
You can use up to 32 alphanumeric characters and symbols when registering
login user names and login passwords. Keep in mind that passwords are case-sensitive.
You should use at least eight characters for the login password so that other
people will not be able to guess it easily.
You cannot include spaces, semicolons (;) or quotes (“”) in the user name, or
leave the user name blank.
You can register up to four sets of login user names and login passwords to
which you can grant administrator authority.
Administrator authentication can also be specified via Web Image Monitor.
For details see the Web Image Monitor Help.
6
71
Page 80
Specifying the Administrator/Security Functions
Administrator Authentication
To specify administrator authentication, set Administrator Authentication Man­agement to [On]. You can also specify whether or not to manage the items in Sys­tem Settings as an administrator.
If you have not registered any administrator, you can obtain each administra­tors authority with the Administrator 1 setting. To log on as an administrator, use the default login user name and login password.
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
The Administrator 1 defaults are admin for the login name and blank for the password. If user authentication has been specified, a screen for authenti­cation appears. To specify administrator authentication, log on as an admin­istrator by entering “admin” as the login user name and leaving the login password blank.
6
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [System Settings].
BBBB
72
Press [Administrator Tools].
CCCC
Press [
DDDD EEEE
Administrator Authentication Management
Specify each administrator authentication.
Specifying User Management Authentication
A Press [
B To specify address book management, press [
User Management
], and then press [On].
].
Administrator Tools
].
Page 81
Administrator Authentication
Specifying Machine Management Authentication
A Press [Machine Management], and then press [On].
B Press the item for which you want to specify management.
Specifying Network Management Authentication
A Press [Network Management], and then press [On].
6
B Press the item for which you want to specify management.
Specifying File Management Authentication
A Press [
B To specify file management, press [
Press [OK].
FFFF
Press the {{{{User Tools/Counter}}}} key.
GGGG
File Management
], and then press [On].
Administrator Tools
].
73
Page 82
Specifying the Administrator/Security Functions
Registering the Administrator
To specify the administrators separately when only Administrator 1 has been specified, log on using the Administrator 1 login user name and login pass­word. To register an administrator, you need to specify the authority of one of the administrators. The data for each administrator can be changed using ad­ministrator authority.
Administrator authentication can also be specified via Web Image Monitor. For details see the Web Image Monitor Help.
Preparation
If administrator authentication has already been specified, log on using a reg­istered administrator name and password. For details about logging on using administrator authentication, see p.75 “Logging on Using Administrator Au- thentication”.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [System Settings].
6
BBBB
74
Press [Administrator Tools].
CCCC
Press [Program / Change Administrator].
DDDD
In the line for the administrator whose authority you want to specify, press
EEEE
[Administrator 1], [Administrator 2], [Administrator 3] or [Administrator 4], and then press [Change].
Press [Change] for the login user name.
FFFF
Page 83
Administrator Authentication
Enter the login user name, and then press [OK].
GGGG
Press [Change] for the login password.
HHHH
Enter the login password, and then press [OK].
IIII
If a password reentry screen appears, enter the login password, and then
JJJJ
press [OK].
Press [Change] for the encryption password.
KKKK
Enter the encryption password, and then press [OK].
LLLL
If a password reentry screen appears, enter the encryption password, and
MMMM
then press [OK].
6
Press [OK].
NNNN
Press [OK].
OOOO
Press the {{{{User Tools/Counter}}}} key.
PPPP
Logging on Using Administrator Authentication
If administrator authentication has been specified, log on using an administra­tors user name and password.This section describes how to log on.
Note
If user authentication has already been specified, a screen for authentication
appears.
To log on as an administrator, enter the administrator’s login user name and
login password.
If you log on using administrator authority, the name of the administrator
logging on appears.
If you log on using a login user name with the authority of more than one ad-
ministrator, Administrator appears.
If you try to log on from an operating screen, “Selected function cannot be
used. appears. Press the {{{{User Tools/Counter}}}} key to change the default.
75
Page 84
Specifying the Administrator/Security Functions
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [Login].
BBBB
Press [
CCCC
Enter the login user name, and then press [OK].
DDDD
Note
6
If assigning the administrator for the first time, enter admin”.
Press [Enter] next to Login Password”.
EEEE
Note
If assigning the administrator for the first time, proceed to step
pressing [
Enter the login password, and then press [OK].
FFFF
Enter [Login].
GGGG
Authenticating... Please wait. appears, followed by the screen for specify­ing the default.
] next to Login User Name”.
Enter
].
Enter
without
G
Logging off Using Administrator Authentication
If administrator authentication has been specified, be sure to log off after com­pleting settings. This section explains how to log off after completing settings.
Press [Logout].
AAAA
Press [Yes].
BBBB
Press the {{{{User Tools/Counter}}}} key.
CCCC
76
Page 85
Administrator Authentication
Changing the Administrator
Change the administrators login user name and login password. You can also assign each administrators authority to the login user names Administrator 1 to Administrator 4 To combine the authorities of multiple administrators, as­sign multiple administrators to a single administrator.
For example, to assign machine administrator authority and user administrator authority to [Administrator 1], press [Administrator 1] in the lines for the machine administrator and the user administrator.
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [System Settings].
BBBB
6
Press [Administrator Tools].
CCCC
Press [Program / Change Administrator].
DDDD
In the line for the administrator you want to change, press [Administrator 1],
EEEE
[Administrator 2], [Administrator 3] or [Administrator 4], and then press [Change].
Press [Change] for the setting you want to change, and re-enter the setting.
FFFF
Press [OK].
GGGG
Press [OK].
HHHH
Press the {{{{User Tools/Counter}}}} key.
IIII
77
Page 86
Specifying the Administrator/Security Functions
Specifying the Extended Security Functions
As well as providing basic security through user authentication and the machine access limits specified by the administrators, you can increase security by, for in­stance, encrypting transmitted data and data in the address book. If you need ex­tended security, specify the machines extended security functions before using the machine.
This section outlines the extended security functions and how to specify them. For details about when to use each function, see the corresponding chapters.
Changing the Extended Security Functions
To change the extended security functions, display the extended security screen as follows:
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
6
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Procedure for Changing the Extended Security Functions
78
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [System Settings].
BBBB
Press [Administrator Tools].
CCCC
Press [Extended Security].
DDDD
Press the setting you want to change, and change the setting.
EEEE
Press [OK].
FFFF
Press the {{{{User Tools/Counter}}}} key.
GGGG
Page 87
Specifying the Extended Security Functions
Settings
❖❖❖❖ Driver Encryption Key
This can be specified by the network administrator. Encrypt the password transmitted when specifying user authentication. If you register the encryp­tion key specified with the machine in the driver, passwords are encrypted.
Driver Encryption Key
Reference
See the printer driver Help.
See the TWAIN driver Help.
❖❖❖❖ Encrypt Address Book
This can be specified by the user administrator. Encrypt the data in the ma­chines address book. Even if one of the machines internal parts is removed, the data in the address book is protected by encryption and cannot be read.
On
Off
Note
Default: Off
❖❖❖❖ Restrict Use of Destinations
This can be specified by the user administrator. The available scanner destinations are limited to the destinations registered in the address book. A user cannot directly enter the destinations for transmission.
6
Note
The destinations searched by Search LDAP can be used.
On
Off
Note
Default: On
79
Page 88
Specifying the Administrator/Security Functions
❖❖❖❖ Permit Adding of Destinations
This can be specified by the user administrator when Restrict Use of Desti­nations is set to [ register it in the address book by pressing [ProgDest]. If this setting is set to
[
], [
Off
ProgDest
not managed by the administrator.
On
Off
Note
Default: On
]. After directly entering a scanner destination, you can
Off
] does not appear. This prevents the registration of destinations
❖❖❖❖ Permit Display of User Information
This can be specified if user authentication is specified. When the job history is checked using a network connection for which authentication is not avail­able, all personal information can be displayed as “********”. For example, when someone not authenticated as an administrator checks the job history using SNMP in SmartDeviceMonitor for Admin, personal information can be displayed as “********” so users cannot be identified. Because no information identifying registered users can be viewed, unauthorized users can be pre-
6
vented from obtaining information about the registered files.
On
Off
Note
Default: On
❖❖❖❖ Enhance File Protection
This can be specified by the file administrator. By specifying a password, you can limit operations such as printing, deleting, and sending files, and can pre­vent unauthorized people from accessing the files. However, it is still possible for the password to be cracked. By specifying Enhance File Protection, files are locked and so become inac­cessible if an invalid password is entered ten times. This can protect the files from unauthorized access attempts in which a password is repeatedly guessed. The locked files can only be unlocked by the file administrator. When “En- hance File Protection is specified, ( ) appears at the top right of the screen.
Note
If files are locked, you cannot select them even if the correct password is
entered.
On
Off
Note
Default: Off
80
Page 89
Specifying the Extended Security Functions
❖❖❖❖ Permit Settings by SNMP V1 and V2
This can be specified by the network administrator. When the machine is ac­cessed using the SNMPv1, v2 protocol, authentication cannot be performed, allowing machine administrator settings such as the paper setting to be changed. If you select [ SNMPv1, v2.
On
Off
Note
Default: On
], the setting can be viewed but not specified with
Off
❖❖❖❖ Permit Simple Encryption
This can be specified by the machine administrator. Under Windows95/98/Me, advanced encryption is not possible with the printer driver, so simple encryption is used. If you select [Off], printing with simple encryption is not allowed and you cannot connect using the printer driver under Windows95/98/Me. Specify this setting when using a driver that does not support advanced encryption.
Limitation
If you set this to [Off], you cannot edit the address book in [User Management
] or [
Tool
addition, you cannot access the machine using DeskTopBinder or Scan­Router delivery software. In this case, you can use SmartDeviceMonitor for Admin, DeskTopBinder, or the ScanRouter delivery software by ena­bling SSL/TLS for encrypted communication. For details about specifying SSL/TLS, see p.45 Setting the SSL / TLS Encryption Mode”.
On
Off
Address Management Tool
] in SmartDeviceMonitor for Admin. In
6
Note
Default: Off
81
Page 90
Specifying the Administrator/Security Functions
Limiting Machine Operation to Customers Only
The machine can be set so that operation is impossible without administrator au­thentication.
The machine can be set to prohibit operation without administrator authentica­tion and also prohibit remote registration in the address book by a service rep­resentative.
We maintain strict security when handling customers data. Also, by being au­thenticated by an administrator to use the machine, we operate the machine un­der the customers control.
Use the following settings.
Service Mode Lock
Settings
❖❖❖❖ Service Mode Lock
6
This can be specified by the machine administrator. Service mode is used by a customer engineer for inspection or repair. If you set the service mode lock to [On], service mode cannot be used unless the machine administrator logs onto the machine and cancels the service mode lock to allow the customer en­gineer to operate the machine for inspection and repair. This ensures that the inspection and repair are done under the supervision of the machine admin­istrator.
Specifying Service Mode Lock
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [
82
BBBB
CCCC DDDD
System Settings
Press [Administrator Tools].
Press [Service Mode Lock].
].
Page 91
Limiting Machine Operation to Customers Only
Press [On] and then [OK].
EEEE
A confirmation message appears.
Press [Yes].
FFFF
Press the {{{{User Tools/Counter}}}} key.
GGGG
Canceling Service Mode Lock
For a customer engineer to carry out inspection or repair in service mode, the machine administrator must log onto the machine and cancel the service mode lock.
Preparation
For details about logging on with administrator authentication, see p.75 Logging on Using Administrator Authentication.
For details about logging off with administrator authentication, see p.76 Logging off Using Administrator Authentication.
6
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [System Settings].
BBBB
Press [Administrator Tools].
CCCC
Press [Service Mode Lock].
DDDD
Press [Off] and then press [OK].
EEEE
Press the {{{{User Tools/Counter}}}} key.
FFFF
The customer engineer can switch to service mode.
83
Page 92
Specifying the Administrator/Security Functions
6
84
Page 93
7. Troubleshooting
Authentication Does Not Work Properly
This section explains what to do if a user cannot operate the machine because of a problem related to user authentication. Refer to this section if a user comes to you with such a problem.
A Message Appears
This section explains how to deal with problems if a message appears on the screen during user authentication.
The most common messages are explained. If some other message appears, deal with the problem according to the information contained in the message.
Messages Causes Solutions
You do not have the privileges to use this function.
The authority to use the func­tion is not specified.
If this appears when trying to use a function: The function is not speci­fied in the address book management setting as be­ing available. The user ad­ministrator must decide whether to authorize use of the function and then assign the authority.
If this appears when trying to specify a default setting: The administrator differs depending on the default settings you wish to speci­fy. Using the list of set­tings, the administrator responsible must decide whether to authorize use of the function.
85
Page 94
Troubleshooting
Messages Causes Solutions
Authentication has failed. The entered login user name
Selected files contain file(s) that the user does not have ac­cess privileges to. Please note that only the files with access privileges will be deleted.
or login password is not cor­rect
The number of users regis­tered in the address book has reached the maximum limit allowed by Windows Authen­tication or LDAP Authentica­tion, so you cannot register additional users.
Cannot access the authentica­tion server when using Win­dows authentication or LDAP authentication.
You have tried to delete files without the authority to do so.
Inquire the user administrator for the correct login user name and login password.
Delete unnecessary user ad­dresses.
A network or server error may have occurred. Contact to the network administrator.
Files can be deleted by the file creator (owner) or file admin­istrator. To delete a file which you are not authorized to de­lete, contact the file creator (owner).
7
86
Page 95
Authentication Does Not Work Properly
Machine Cannot Be Operated
If the following conditions arise while users are operating the machine, provide instructions on how to deal with them.
Condition Cause Solution
Cannot print using the printer driver or connect using the TWAIN driver.
Cannot connect to the deliv­ery server.
Cannot log off when using the copying or scanner functions.
[ProgDest]
the scanners screen for speci­fying destinations.
does not appear on
User authentication has been rejected.
The encryption key specified in the driver does not match the machines driver encryp­tion key.
If “Permit Simple Encryption
[Off]
is set to driver uses simple encryption.
The ScanRouter delivery soft­ware may not be supported by the machine.
The original has not been scanned completely.
[Permit Adding of Destinations]
set to
Destinations] rity]
trator can register destinations in the address book.
, data sent by the
[Off]
[Restrict Use of
in
[Extended Secu-
in
, so only the user adminis-
is
Enter the login user name and login password in the printer driver.
If using Windows authentica­tion or LDAP authentication, inquire the network adminis­trator for the user name and login name.
If using basic authentication, inquire the user administra­tor.
Specify the driver encryption key registered in the machine.
See p.36 Driver Encryption Key”.
Under Windows NT 4.0, Win­dows 2000/XP, and Windows server 2003, enable driver en­cryption.
Under Windows 95/98/Me, you can use only simple en­cryption, so you cannot print. Under Windows 95/98/Me, set Permit Simple Encryp-
[On]
tion to
[System Settings]
Update to the latest version of the ScanRouter delivery soft­ware.
When the original has been scanned completely, press remove the original, and then log off.
Registration must be done by the user administrator.
in the machine’s
.
[#]
7
,
87
Page 96
Troubleshooting
Condition Cause Solution
Stored files do not appear. User authentication may have
Destinations do not appear. User authentication may have
Cannot print when user au­thentication has been speci­fied.
If you try to interrupt a job while copying or scanning, an authentication screen ap­pears.
7
Cannot register entries in [Pro- gram No.10] for program regis-
tration in the copier function.
been disabled while [All Users] is not specified.
been disabled while [All Users] is not specified.
User authentication may not be specified in the printer driver.
With this machine, you can log off while copying or scan­ning. If you try to interrupt copying or scanning after log­ging off, an authentication screen appears.
If Change Initial Mode is set to [Program No.10] in [General
Features] in [Copier / Document Server Features], entries can be
registered in [Program No.10] only by the machine adminis­trator.
Re-enable user authentication, and then enable [All Users] for the files that did not appear. For details about enabling [All Users], see p.11 Specifying Access Permission for Stored Files”.
Re-enable user authentication, and then enable [All Users] for the destinations that did not appear.
For details about enabling [All Users], see p.19 “Protecting the Address Book”.
Specify user authentication in the printer driver.
For details, see the printer driver Help.
Only the user who executed a copying or scanning job can interrupt it.Wait until the job has completed or consult an administrator or the user who executed the job.
The machine administrator must carry out the registra­tion.
88
Page 97
8. Appendix
Operations by the Supervisor
The supervisor can delete an administrators password and specify a new one. If any of the administrators forget their passwords or if any of the administrators change, the supervisor can assign a new password. If logged on using the super­visors user name and password, you cannot use normal functions or specify de­faults. Log on as the supervisor only to change an administrators password.
Important
The default login user name is “supervisor and the login password is blank.
We recommend changing the login user name and login password.
When registering login user names and login passwords, you can specify up
to 32 alphanumeric characters and symbols. Keep in mind that user names and passwords are case-sensitive.
Be sure not to forget the supervisor login user name and login password. If
you do forget them, a service representative will to have to return the ma­chine to its default state. This will result in all data in the machine being lost and the service call may not be free of charge.
Note
You cannot specify the same login user name for the supervisor and the ad-
ministrators.
Using Web Image Monitor, you can log on as the supervisor and delete an ad-
ministrators password.
Logging on as the Supervisor
If administrator authentication has been specified, log on using the supervisor login user name and login password. This section describes how to log on.
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [Login].
BBBB
Press [Enter] for [Login User Name].
CCCC
Note
When you assign the administrator for the first time, enter supervisor”.
Enter a login user name, and then press [OK].
DDDD
Press [Enter] for [Login Password].
EEEE
89
Page 98
Appendix
Enter a login password, and then press [OK].
FFFF
Note
When you assign the administrator for the first time, proceed to step
without pressing [Enter].
Press [Login].
GGGG
Logging off as the Supervisor
If administrator authentication has been specified, be sure to log off after com­pleting settings. This section explains how to log off after completing settings.
Press [Logout].
AAAA
G
Press [
BBBB
Press the {{{{User Tools/Counter}}}} key.
CCCC
Yes
].
Changing the Supervisor
8
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [
BBBB
CCCC DDDD EEEE
System Settings
Press [Administrator Tools].
Press [Program / Change Administrator].
Under Supervisor, click [
].
Change
].
90
Page 99
Press [Change] for the login user name.
FFFF
Enter the login user name, and then press [OK].
GGGG
Operations by the Supervisor
Press [
HHHH
Enter the login password, and then press [OK].
IIII
If a password reentry screen appears, enter the login password, and then
JJJJ
press [OK].
Press [OK].
KKKK
Press [OK].
LLLL
Press the {{{{User Tools/Counter}}}} key.
MMMM
] for the login password.
Change
Resetting an Administrators Password
Press the {{{{User Tools/Counter}}}} key.
AAAA
Press [Login].
BBBB
Log on as the supervisor.
CCCC
You can log on in the same way as an administrator.
Press [
DDDD EEEE FFFF GGGG
System Settings
Press [
Administrator Tools
Press [Program / Change Administrator].
Press [
] for the administrator you wish to reset.
Change
].
].
8
Press [
HHHH
Enter the login password, and then press [OK].
IIII
If a password reentry screen appears, enter the login password, and then
JJJJ
press [OK].
] for the login password.
Change
91
Page 100
Appendix
Press [OK].
KKKK
Press [OK].
LLLL
Press the {{{{User Tools/Counter}}}} key.
MMMM
8
92
Loading...