Table Of Contents - Canon imageRUNNER ADVANCE System V3.13 Service Manual

Table of Contents

Advertisement

1. Overview of System Management.................................................................. 1
Overview of System Management...................................................................................................... 2
Third Generation System Software..................................................................................................... 3
Checking the Platform Version............................................................................................................4
2. Authentication.................................................................................................. 5
Login Services.....................................................................................................................................6
Overview.............................................................................................................................................. 6
User Authentication...............................................................................................................................9
DepartmentID Authentication overview................................................................................................... 9
Integrated Authentication Function......................................................................................................... 9
Management of the Authentication Method.......................................................................................11
Change Login Services Procedure....................................................................................................... 11
Login Service Installation Procedure.....................................................................................................12
Login Service Uninstallation Procedure.................................................................................................12
Authentication Settings........................................................................................................................ 13
Configuring Picture Login.....................................................................................................................13
Procedure for Enabling Mobile Authentication....................................................................................... 14
Management of Users....................................................................................................................... 17
Registering/Editing/Deleting Users....................................................................................................... 17
Importing/Exporting Registered Users.................................................................................................. 17
Administrator Users (Reference Information).........................................................................................17
3. Security Function...........................................................................................20
Security of Storage............................................................................................................................21
Storage Management.......................................................................................................................... 21
Encryption of Storage.......................................................................................................................... 21
Encryption Key....................................................................................................................................21
Protection of Encryption Keys, Certificates and Passwords..............................................................22
Security information structure...............................................................................................................22
Security Policy Function.................................................................................................................... 24
Specifications..................................................................................................................................... 24
Exporting and Importing Setting Information..........................................................................................25
Differences between Security Administrators and System Administrators................................................25
Initializing the Security Administrator Password.....................................................................................25
Restrict Service Representative Access Function.............................................................................27
What Is User Asset Information?.......................................................................................................... 27
Purpose of This Function..................................................................................................................... 27
Advantages and Restrictions................................................................................................................27
Function Overview.............................................................................................................................. 27
Setting Procedure............................................................................................................................... 28
Procedure to Confirm the Settings........................................................................................................28
Procedure to Cancel the Setting...........................................................................................................29
Restricted Settings.............................................................................................................................. 29
Contents
i
Contents

Advertisement

Table of Contents
loading

Table of Contents