Dell C5765DN Betriebsanweisung Seite 481

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 673
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 480
Authentication
User Roles
The following three user roles are available:
User
No special authority is given to this user role.
System Administrator
The same authority as a system administrator is given except for the following operations:
•Operate folders
Operate job flows sheets
Change the passcode of the system administrator
Account Administrator
The following authorities are given:
Create, delete, change (except for passcode), and view (unavailable depending on some
settings) user information
Create, delete, change, and view accounting
Change Alternative Name for Account ID or Mask Account ID
Print an Auditron Report for each user
Authorization Groups
The following settings can be configured for each authorization group.
For details on authorization groups, refer to "Create Authorization Groups" (P.410).
Restrict Recipient Selection Method
Allows you to set whether or not to permit the group members to specify recipients when
[Restrict Recipient Selection Method] is set to [Only From Address Book].
For details on the Restrict Recipient Selection Method setting, refer to "Restrict Recipient Selection
Method" (P.314).
Restrict User to Edit Address Book
Allows you to set whether or not to permit the group members to edit the Address Book in
the machine when editing the Address Book is prohibited.
For details on the Restrict User to Edit Address Book setting, refer to "Restrict User to Edit Address
Book" (P.314).
Types of Authentication
The following describes the types of authentication (Login Type) available on the machine.
The following authentication methods are available.
User ID Authentication
The machine requires users to enter their user IDs and passcodes with the numeric keypad
or the touch screen of the machine.
Authentication is performed using user information registered on the machine or a remote
server.
The following two types of authentication methods are available according to the registration
condition of user information.
481
Seitenansicht 480
1 2 ... 476 477 478 479 480 481 482 483 484 485 486 ... 672 673

Kommentare zu diesen Handbüchern

Keine Kommentare