Restricting device use, Managing available usage – Oki MC363dn User Manual

Page 6

Advertising
background image

- 6 -

Active Directory-linked Management ............................................................. 138

Adding Users/User Groups ......................................................................................... 138
Changing User Information ........................................................................................ 139
Changing Attributes Displayed in the User List ............................................................. 141
Deleting Users/User Groups ....................................................................................... 141

9. Restricting Device Use .......................................................143

What Can Be Done With Use Restrictions ...................................................... 143

Usage Limitations ..................................................................................................... 143

Setting Use Restrictions for User Names........................................................ 147

Adding from the User ................................................................................................ 147
Adding Manually ...................................................................................................... 149
Adding from the Job Log ........................................................................................... 150
Creating a CSV File to Add in a Batch .......................................................................... 150
Importing Users Specified in Windows ......................................................................... 151
Adding by Associating a PIN to an Authentication User Name ......................................... 152
Adding Unregistered User Settings ............................................................................. 153
Registering Roles ..................................................................................................... 153

Setting LDAP Authentication ........................................................................ 154
Setting Use Restrictions Targeted to the Document Name ................................ 155

Adding from the Job Log ........................................................................................... 155
Adding Manually ...................................................................................................... 157
Adding Unregistered Item Setting ............................................................................... 157

Setting Use Restrictions Targeted to the Host Name ........................................ 158

Adding from the Job Log ........................................................................................... 158
Adding Manually ...................................................................................................... 160
Adding Unregistered Item Settings ............................................................................. 160

Setting Use Restrictions Targeted to the Application Name ............................... 161

Adding Manually ...................................................................................................... 161
Adding from the Job Log ........................................................................................... 162
Adding Unregistered Item Settings ............................................................................. 163

Displaying Device Registered Use Restrictions ................................................ 164
Changing Device Registered Use Restrictions ................................................. 164
Delete Device Registered Use Restrictions ..................................................... 166

Deleting Individual Use Restrictions ............................................................................ 166
Deleting All Use Restrictions (Restoring Initial Status) ................................................... 167

Temporarily Disabling Use Restrictions .......................................................... 168

Enabling Use Restrictions .......................................................................................... 168

10. Managing Available Usage ................................................170

What can be done with available usage ......................................................... 170
Setting the Available Usage ......................................................................... 170

Changing the Priority Level of User Group .................................................................... 171

Creating Fee Charge Definitions ................................................................... 172
Setting Fee Definitions for Devices ............................................................... 176
Changing Fee Charge Definitions .................................................................. 177

Advertising