Authentification Et Accounting
Authentification Et Accounting
Accounting Feature
12.1 Summary
Use the authentication feature to restrict access to the machine itself, or restrict access for each
service. This also allows users to process and manage data on service usage status per user.
Types of Users
Users are grouped into the following categories when using the authentication feature.
Administrator
This type of user is able to register and change system setting value according to the user
environment.
Administrators use a specially defined user ID called an administrator ID.
Login User
This type of user is registered to the machine or an external server. Each user is authenticated by a
user ID.
The user ID of an authenticated user can be associated with a sub user based on its intended use. The
user ID of an authenticated user can be associated with up to 10 sub user IDs.
Note
z Set the User ID within 32 characters.
z
A separate application is required to use sub users. For details, contact your local representative.
Guest User
This type of user has not been registered.
Guest users cannot access restricted services.
Administrator Permissions
You can configure administrator and account administrator permissions for each authenticated user.
12.1 Summary
217
Administrator
The same permissions as the administrator can be granted. However, the following actions will be
unavailable.
z
Folder Operations
z
Controlling job flow sheets
z Changing administrator passwords
Account Administrator
The following permissions can be granted.
z Regarding, deleting, changing (password cannot be changed by themselves) or referencing (may
be unavailable based on some setting configurations) user information
z
Registering, deleting, changing or referencing accounting data
z
Changing alternative name for user ID/mask user ID (***)
z Changing alternative name for account ID/mask account ID (***)
z
Printing accounting reports
Authorization Groups
You can divide permissions allowing access to features for registering authenticated users. Users
belonging to an authorization group can perform the same actions as the administrator.
Refer
zRefer to "Authorization Groups" (P.227) for more information.
Usage Limit
Usage Limit Across Entire System
You can restrict access to the machine and each service in Authentication Mode. User authentication
is required to use this.
Refer
z
Refer to "[Authentication]" (P.197) for more information.
Refer
zRefer to "Services that Allow Usage Limit or Accounting Settings for Authentication/Accounting Mode"
(P.222) and "Authentication for Job Flow Sheets and Folders" (P.223) for more information.
Note
zThe remote authentication kit is required.
z
When using remote accounts (other than when using our products (sold separately)), you can select
available services from the touch panel display on the machine based on access permission information
retrieved from the external authentication server.
Authentication Method
User ID Authentication
User information such as User IDs and passwords is registered to the machine or an external
authentication server in advance for users to enter in their user ID and password from the touch
panel display on the machine directly for authentication.
Card Authentication
User information such as card numbers registered to cards, user IDs and passwords is registered to
the machine or an external authentication server in advance for card authentication.
Note
z
To use card authentication and user ID authentication in local accounts, set [Login When Card Reader Is
Connected] to [IC Card / Control Panel Login]. Refer to "[Authentication]" (P.197) for more information.
Accounting Feature
Types of Accounting Modes
Local Accounting
Accounting reports are performed using authenticated user information registered to the machine.
Authentication/Accounting Mode is set to [Local], Authentication becomes “Local Accounting”.
Note
z
The following users can print accounting reports.
- Administrator
- Users granted administrator permissions
- Users granted account administrator permissions
12.1 Summary
219
Network Accounting
Performs accounting using user details managed with remote services.
Job data saved to the machine by the external service is collected and processed by user.
Authentication/Accounting Mode is set to [Network], Authentication becomes “Network
Accounting”.
Note
z
User information managed in an external service is sent from the external service to the machine and
registered to the machine. When the user information managed in an external service is updated, the
updated user information must be sent from the external service to the machine.
Note
z
If [Authentication System] is other than [Authentication Agent], accounting is not performed with the
authentication server.
*1 :Printing is possible if [Permissions] > [Permissions] > [Access Control] > [Non-Account Print] is set to [Unlocked] in
Internet Services.
Scanner
12.1 Summary
221
z The communication frequency does not take into account the following communications.
- Entering a number using the keypad, or using on-hook/off-hook
- Using an address for which billing information has not been registered
- When placing calls (included calls made before communications)
Fax Billing
The following actions are not charged.
z Entering a number using the keypad and dialing the number
z
Communications to an address for which billing information has not been registered
z
When manually receiving, sending and polling
z When placing calls
Creating Folders
When using the authentication feature, the relationship between creators and users of folders that
can be created/used is as follows.
Note
z
Files registered and printed using Network Scanner Utility 3 are outside the scope of authentication.
Note
z
To require password entry for authentication, set [Password for Control Panel Login] or [Password for IC
Card Login] to [On]. For details, refer to "[Authentication]" (P.197).
z It is necessary to log in to Administrator Mode to perform the following settings.
Access Control
1. Tap on > [Device] > [Authentication/Accounting] > [Authentication/Security Settings] >
[Authentication] > [Access Control].
Note
z
If [Locked (Show Icon)] is set, the confirmation screen displays when you tap on the icons on the Home
screen without authentication.
z
If [Locked (Hide Icon)] is set, the icons for the corresponding function button are not displayed on the
Home screen without authentication.
5. Tap on [<].
Authorization Groups
Register authorization groups to assign to users.
2. Select the authorization group number to register, and then tap on [Create/Delete].
Note
z
The following users will belong to the No. 00 [DefaultGroup (Default)] (default authorization group).
- Newly created users
- Users that have not yet been authenticated
- Authenticated users for which the [Authentication System] is not set to [Authentication Agent] in
remote accounts
z
The default authorization group can be changed in the same manner as other authorization groups.
3. Tap on [Group Name], enter the name and then tap on [OK].
Note
z
Users can also be registered in [Authentication/Accounting Settings] under [Accounting].
Note
z The unique number with 4 digit (user registration number) are assigned to the field to register a user.
9. Tap on [OK].
[Email Address]
This is used as the default ["From" Address] address when sending Emails when authenticating.
[Device Access]
Allows machine use.
Note
z
If an IC Card reader is connected, this permission can be set for each authentication method.
[Feature Access/Limits]
Specify use restrictions and account limit settings for each service. Select the service, and then set
either [Feature Access] or [Account Limit], and tap on [OK].
[User Permissions]
You can grant permissions to users. Configure authorization group settings in [Add to Permission
Group].
z
[Local User]
Permissions for regular users who do not have administrator permissions.
z [System Administrator]
The same permissions as the administrator can be granted. However, folders and job flow sheets
cannot be modified, and administrator passwords cannot be changed.
z
[Account Administrator]
The following accounting-related permissions can be granted.
- Registering/deleting/changing (some) user information
- Registering/deleting/changing accounting data
- Changing alternative name for user ID/mask user ID (***)
- Changing alternative name for account ID/mask account ID (***)
- Printing accounting reports
4. Tap on [Delete].
3. Tap on [Delete].
1. Tap on > [Device] > [Network Settings] > [Remote Authentication / Directory Service] >
[Authentication System Setup] > [Authentication System].
2. Select the type of external authentication server, and then tap on [OK].
Note
zIf using our products (sold separately) as the remote accounts, select [Authentication Agent].
3. If an option other than [Authentication Agent] is selected, tap on [<], and then register the
authentication server details.
Refer
zRefer to Internet Services help for details of Microsoft Entra ID.
6. Enter the port number to run LDAPS, and then tap on [OK].
Refer
zFor more information about [Active Directory Domains and Trusts], refer to the official website of
Microsoft.
1. Tap on > [Device] > [Network Settings] > [Remote Authentication / Directory Service] > [LDAP
Server / Directory Service Settings].
Note
zThe maximum number of servers that can be connected is the value set for the [LDAP Referral Hop
Limit]. If this is set to “5”, up to five trust relationship connections can be made.
z
With regard to [Login Credentials to Search Entries], users must also be qualified to access the trusted
LDAP server.
z
From a security feature perspective, connections will not be made to unencrypted trusted domains while
LDAPS is in use.
1. Tap on > [Device] > [Network Settings] > [Remote Authentication / Directory Service] >
[Authentication System Setup].
[Search Timeout]
This sets the maximum timeout duration for a response from the server when an search request is
sent to the LDAP server.
Change this setting when the LDAP server load is thought to be causing the issue.
3. Select [Active Directory® Server], enter your Active Directory ID and password and then tap on
[Register].
Note
z
If you want to control access for each user, a system administrator needs to set.
z The password you entered in this procedure is registered as the password of the machine. Even if you
change Active Directory's password, the machine’s password is not changed automatically. When you
change Active Directory's password, change it on the control panel of the machine.
2. Touch the unregistered IC Card over the IC Card reader of the machine to authenticate as the
[Guest User].
4. Select [Local Machine] for [Domain]. And enter your ID and password noticed by the system
administrator. And then tap on [Register].
Re-registration of Card
If you need to re-register (overwrite) a different IC Card which is not the same IC Card as you have
ever used.
3. Tap on [OK].
1. Tap on > [Device] > [Network Settings] > [Remote Authentication / Directory Service] > [LDAP
Server / Directory Service Settings] > [Attribute of IC Card].
2. Enter the attribute name corresponding to the IC Card ID, and then tap on [OK].
Note
z
The IC Card ID must be registered to the attribute in advance.
z Set an attribute that guarantees that each user is provided with a unique value.
4. Once authentication using the IC Card is complete, enter the user display name and the attribute
name to use as the identifier, and then tap on [OK].
Note
z
Set an attribute that guarantees that each user is provided with a unique value.
z If the set attribute cannot be retrieved from the LDAP server, you will be unable to log in.
1. Tap on > [Device] > [Authentication/Accounting] > [User Details Setup] > [Change Password].
4. Enter the new password, tap on [Next], and then enter the same password.