Owner manual

Menu overview and advanced features_ 41
You can group the users and manage them as a group. You can add up
to 1,000 entries.
Users identified by user IDs and passwords are allowed to modify their
passwords. They are also allowed to view all of their profile information.
When it comes to the role, users are allowed to see only the role they
belong to but not its permissions.
1. Press Machine Setup > Security > User Profile from the display
screen.
2. Select Individual or Group using the left/right arrows and select the
appropriate option.
Individual
- New: Press this button to create a new user.
- User
ID: Enter the user ID
you want to use. You can
enter up to 63 characters.
- User Name: Enter the user name you want to use.
- Password: Enter th
e password you want to use. You can
enter up to 63 characters.
- Con
firm Password: Re-en
ter the password for
confirmation.
- Email: Enter the email address.
- Fax
No.: Enter the fax number.
- PIN Code: Enter the pin
code.
- Group Name: Enter the grou
p name you want to be in.
Press the Search button to browse the groups.
- Detail: Select the user you want to print and press this
button.
- Edit
: Sel
ect the user you want to edit and press this button.
- Delete: Select
the user you want to delete and press this
button.
- Se
arch: En
ter the user ID you want to find and press this
button.
Group
- New: Press this button to create a new user.
- G
roup Name: Enter the grou
p name you want to use.
- Role: Select the role of the group.
- De
tail: Sele
ct the group you want to print and press this
button.
- Edit
: Sel
ect the group you want to edit and press this button.
- Delete: Select th
e group you want to delete and press this
button.
- Se
arch: Enter the
group name you want to find and press
this button.
3. Press OK to save the change or Back (Cancel) to return to the
previous screen.
802.1x
You can enable 802.1x authentication, which is a port-based
authentication. If this authentication is enabled, the machine is not
allowed to access through the protected side of the network until the
machine is authorized. Use this feature to protect your network.
You can also use this feature from the SyncThru™ Web Service.
Open the Web browser from your networked computer and type
the IP address of your machine. When SyncThru™ Web Service
opens, click the Security tab > Network Security (see "802.1x"
on page 89).
1. Press Ma
chine Setup > Security > 802.1x from the display screen.
2. Select On.
3. Select the appropriate option. If you select EAP-MD5 or
EAP-MS-CHAPv2, go to step 4. If you select
PEAPv0/EAP-MS-CHAPv2 or TLS, go to step 5.
EAP-MD5: Offers minimal security. The MD5 hash function is
vuln
erabl
e to dictionary attacks, and does not support key
generation.
PEAPv0/EAP-MS-
CHAPv2: Recommended for users who only
intend to use Microsoft desktop clients and servers. For other
users, it is not recommended.
EAP-MS-CHAPv2: MS-CHAPv2 provide
s two-way
authentication between peers by combining a peer Challenge
message with the Response packet and an authenticator
Response message on the Success packet.
TL
S: Thi
s is used to provide secure communication over the
Internet between a client and server.
4. Enter the
ne
cessary information and press OK. Go to step 6.
5. Press Certificate and select the certificate to use. Enter the
necssary information and press OK.
6. Press Back (Cancel) to return to the previous screen.