Types of authentication, Fer to "types of authentication" (p.483) – Dell C5765DN MFP Color Laser Printer User Manual

Page 483

Advertising
background image

Authentication

483

User Roles

The following three user roles are available:

User

No special authority is given to this user role.

System Administrator

The same authority as a system administrator is given except for the following operations:
• Operate folders
• Operate job flows sheets
• Change the passcode of the system administrator

Account Administrator

The following authorities are given:
• Create, delete, change (except for passcode), and view (unavailable depending on some

settings) user information

• Create, delete, change, and view accounting
• Change Alternative Name for Account ID or Mask Account ID
• Print an Accounting Report for each user

Authorization Groups

The following settings can be configured for each authorization group.

For details on authorization groups, refer to "Create Authorization Groups" (P.410).

Restrict Recipient Selection Method

Allows you to set whether or not to permit the group members to specify recipients when

[Restrict Recipient Selection Method] is set to [Only From Address Book].

For details on the Restrict Recipient Selection Method setting, refer to "Restrict Recipient Selection

Method" (P.314).

Restrict User to Edit Address Book

Allows you to set whether or not to permit the group members to edit the Address Book in

the machine when editing the Address Book is prohibited.

For details on the Restrict User to Edit Address Book setting, refer to "Restrict User to Edit Address

Book" (P.314).

Types of Authentication

The following describes the types of authentication (Login Type) available on the machine.
The following authentication methods are available.

User ID Authentication

The machine requires users to enter their user IDs and passcodes with the numeric keypad

or the touch screen of the machine.
Authentication is performed using user information registered on the machine or a remote

server.
The following two types of authentication methods are available according to the registration

condition of user information.

Advertising