Bizhub C3351 Security Operations User Guide
Bizhub C3351 Security Operations User Guide
Bizhub C3351 Security Operations User Guide
2017. 6
Ver. 1.02
Contents
1 Security
1.1 Introduction ..................................................................................................................................... 1-2
Administrators.................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ......................................................................................... 1-2
Operating Precautions ....................................................................................................................... 1-2
INSTALLATION CHECKLIST.............................................................................................................. 1-4
1.2 Security Functions .......................................................................................................................... 1-7
Check Count Clear Conditions .......................................................................................................... 1-7
1.3 Precautions for Operation Control ................................................................................................ 1-9
Roles of the Owner of the Machine ................................................................................................... 1-9
Roles and Requirements of the Administrator ................................................................................... 1-9
Password Usage Requirements ........................................................................................................ 1-9
External authentication server control requirements ....................................................................... 1-10
Security function operation setting operating requirements............................................................ 1-10
Operation and control of the machine ............................................................................................. 1-10
Machine Maintenance Control......................................................................................................... 1-12
Precautions for using the printer driver............................................................................................ 1-12
1.4 Miscellaneous................................................................................................................................ 1-13
Password Rules ............................................................................................................................... 1-13
Precautions for Use of Various Types of Applications..................................................................... 1-14
Encrypting communications ............................................................................................................ 1-14
IPsec setting .................................................................................................................................... 1-14
Print functions .................................................................................................................................. 1-15
IPP printing ...................................................................................................................................... 1-15
Items of Data Cleared by Overwrite All Data Function .................................................................... 1-16
Fax functions.................................................................................................................................... 1-16
USB keyboard.................................................................................................................................. 1-16
Different types of boxes................................................................................................................... 1-17
Hardware and software used in the machine .................................................................................. 1-17
Firmware integrity verification function ............................................................................................ 1-17
CS Remote Care function ................................................................................................................ 1-18
Terminating a Session and Logging out .......................................................................................... 1-18
Authentication error during external server authentication.............................................................. 1-18
2 Administrator Operations
2.1 Accessing the Administrator Mode............................................................................................... 2-2
2.1.1 Accessing the Administrator Mode.................................................................................................... 2-2
2.1.2 Accessing the User Mode.................................................................................................................. 2-8
2.2 Enhancing the Security Function................................................................................................. 2-12
2.2.1 Items cleared by HDD Format ......................................................................................................... 2-14
2.2.2 Setting the Password Rules............................................................................................................. 2-15
2.2.3 Setting the Enhanced Security Mode .............................................................................................. 2-17
2.3 Protecting Machine from Illegal Firmware Update.................................................................... 2-20
Setting the FW Update (USB) Password ......................................................................................... 2-20
2.4 Preventing Unauthorized Access ................................................................................................ 2-23
Setting Prohibited Functions When Authentication Error ................................................................ 2-23
2.5 Canceling the Operation Prohibited State.................................................................................. 2-25
Performing Release Setting ............................................................................................................. 2-25
2.6 Setting the Authentication Method ............................................................................................. 2-27
2.6.1 Setting the Authentication Method .................................................................................................. 2-27
2.6.2 Setting the External Server .............................................................................................................. 2-30
2.7 ID & Print Setting Function........................................................................................................... 2-32
Setting ID & Print.............................................................................................................................. 2-32
3 User Operations
3.1 User Authentication Function ........................................................................................................ 3-2
3.1.1 Performing user authentication.......................................................................................................... 3-2
3.1.2 Accessing the ID & Print Document................................................................................................... 3-6
3.2 Change Password Function ........................................................................................................... 3-7
Performing Change Password ........................................................................................................... 3-7
3.3 Secure Print Function ................................................................................................................... 3-10
Accessing the Secure Print Document ............................................................................................ 3-10
3.4 User Box Function ........................................................................................................................ 3-13
3.4.1 Setting the User Box........................................................................................................................ 3-13
3.4.2 Changing the user/account attributes and box password .............................................................. 3-18
3.4.3 Accessing the User Box and User Box file ...................................................................................... 3-24
1 Security
1.1 Introduction
Thank you for purchasing our product.
This User's Guide contains the operating procedures and precautions to be used when using the security
functions offered by the bizhub C3851FS/C3851/C3351 machine. To ensure the best possible performance
and effective use of the machine, read this manual thoroughly before using the security functions. The ad-
ministrator of the machine should keep this manual for ready reference. The manual should be of great help
in finding solutions to operating problems and questions.
This User's Guide (version 1.02) covers the following.
Administrators
<Administrator of the machine>
There are two types of administrators; one who is implemented on the machine in advance, and the other
who is registered by the implemented administrator. The former is called the built-in administrator and the
latter is called a user administrator. Below, the administrator of the machine means the build-in administrator.
<User administrator>
The user administrator is a user who is given the authority to operate the machine as an administrator. The
administrator of the machine or the user administrator can register the user administrator. Be sure that "Pre-
cautions for Operation Control" applies to the user administrator. For details, see page 1-9.
The differences from the administrator of the machine are as follows:
- The same procedure as a user applies to the user administrator when he or she changes the password
or fails authentication.
- To change password, log on to the User Mode.
<Note>
Below, the administrator collectively means both the administrator of the machine and the user administrator.
Operating Precautions
The machine gives an alarm message or an alarm sound (peep) when a wrong operation is performed or a
wrong entry is made during operation of the machine. (No "peep" alarm sound is issued if a specific sound
setting in Sound Setting of Accessibility Setting is set to [OFF].) If the alarm message or alarm sound is given,
perform the correct operation or make the correct entry according to the instructions given by the message
or other means.
The administrator must not leave the machine with each setting screen left displayed before, during, and after
access to each mode. If he or she has to leave the machine, make sure that he or she logs out and returns
the screen to the authentication screen.
The administrator must make sure that each individual general user logs out and returns the screen to the
authentication screen if he or she leaves the machine with each mode screen left displayed before, during,
and after access to each mode.
For any query, request, or opinion concerning the machine, please contact your dealer from which you pur-
chased your machine or Service Representative.
Any notice concerning this machine will be given in writing by the dealer from which you purchased your ma-
chine or Service Representative.
If the machine has been unpacked, check with the administrator that it was the adminis-
trator who unpacked the machine and nobody but the administrator has gain access to the
machine after the unpacking. Then, obtain the administrator's consent to the performance
of the installation procedure for the unpacked machine before attempting to start the pro-
cedure. If the administrator's consent cannot be obtained, call the dealer.
I swear that I would never disclose information as it relates to the settings of this machine
to anybody, or perform malicious or intentional act during setup and service procedures
for the machine.
When giving a copy of the User's Guide, explain the following to the administrator:
• A digital signature is assigned to the data certified by ISO15408. To ensure integrity of
the file, have the administrator of the machine confirm the digital signature using the
property of the provided data file in the user's PC environment.
Confirm the digital signature as follows.
Right click the provided exe file to display the property screen.
Select [Digital Signatures] - [Details] - [General], and check that Konica Minolta, Inc. is
displayed in the Name of signer field.
Select [View Certificate] - [General]. Then, check that the signing time is within the val-
idated date of the certificate and that the certificate has been issued by a reliable cer-
tification authority.
Write down the serial number shown in [View Certificate] - [Details]. Access to the URL
for CRL Distribution Points and confirm that the serial number is not shown in
[Revocation List]. For confirmation, the Internet environment is required.
• Two versions are available, the HTML version and User's Guide Security Operations
(this User's Guide).
• In HTML version, option settings are described including functions those can be uni-
versally configured, but it does not mean that all of them are available.
• This User's Guide must first be read and the conditions described in this User's Guide
take precedence over the HTML version.
• If the security functions of the machine are to be enhanced, the machine and its sur-
rounding environment should be set up and operated according to this User's Guide.
Refer to the Service Manual and perform the required installation and setup steps.
During the installation and setup procedure, make sure that no unnecessary parts are
mounted on the machine and have the administrator of the machine confirm that no un-
necessary parts are mounted on the machine.
• Explain to the administrator making him/her check the cover of the Service Manual to
be referred that it is for bizhub C3851/bizhub C3351/bizhub C3851FS (Version: G00-
11). Explain to the administrator that the following settings must be performed referring
to the manuals above.
• The Service Engineer must have the administrator confirm that the digital signature is
assigned to the firmware and the version of the firmware to be updated is the one that
is written on the Service Manual.
After completing the checks, keep a copy of this list in the Service Representative and give the original of this
list to the administrator of the machine.
Please direct your any queries about using the machine to the Service Representative shown below.
Function Description
Identification and au- Access control is then provided through password authentication for any ac-
thentication function cess to the Administrator Mode, User Authentication mode, User Box, a User
Box data file, and a Secure Print document. Access is thereby granted only
to the authenticated user. A password that can be set must meet the Pass-
word Rules. The machine does not accept setting of an easily decipherable
password. For details of the Password Rules, see page 1-13.
If a wrong password is entered, during password authentication, a predeter-
mined number of times (once to three times.) or more set by the administra-
tor, the machine determines that it is unauthorized access through Prohibited
Functions When Authentication Error, prohibiting any further entry of the
password. By prohibiting the password entry operation, the machine pre-
vents unauthorized use or removal of data. The administrator is responsible
for resetting the prohibition of the password entry operation. For details, see
page 2-25.
User limiting function Specific functions to be used by each user/account may be limited. For de-
tails, see page 2-37.
HDD encryption function By setting the Encryption Key, the data stored in the HDD is encrypted, there-
by protecting the data in the HDD. For details, see page 2-64.
Auditing function Information including operations performed on the machine and a job history
can be stored in the HDD. Setting the Job Log (Audit Log) allows an illegal
act or inadequate operation performed on the machine to be traced. The ob-
tained Job Log can be downloaded and viewed from the Web Connection.
For details, see page 2-74.
Residual information de- When the machine is to be discarded or use of a leased machine is terminat-
leting function ed at the end of the leasing contract, setting of the Overwrite HDD Data func-
tion while the machine was in use allows residual unnecessary data to be
deleted, because the machine overwrites a specific overwrite value over the
unnecessary data. This prevents data leakage. (Passwords, addresses, and
other data set while the machine was in use should, however, be deleted
manually.) For details, see page 2-70.
To delete data including the passwords, addresses, and other data all at
once, the Overwrite All Data function overwrites and erases all data stored in
all spaces of the HDD. The function also resets all passwords saved in the
flash memory and eMMC to factory settings, preventing data from leaking.
For details, see page 2-72. For details of items to be cleared by Overwrite All
Data function, see page 1-16.
Network communication Communication data transmitted to or from the machine and client PC can
protecting function be encrypted using the IPsec, which prevents information leakage through
sniffing over the network. For details, see page 1-14.
The administrator disables the following functions and operates and manages the machine under a condition
in which those functions are disabled.
*: It will not be displayed in case of service mode where the setting is not configured (the function is set to
OFF when it is not displayed).
Password Rules
Study the following table for details of the number and types of characters that can be used for each pass-
word. For details of the settings of the Password Rules, see page 2-15.
Encrypting communications
This machine guarantees encrypted communication via IPsec.
IPsec setting
This machine offers a choice of two authentication methods of [Pre-Shared Key] and [Digital Signature] for
authenticating the remote machine with which to communicate.
When [Pre-Shared Key] is to be used, control the pre-shared key appropriately to ensure that it is not leaked
to any third party other than the remote machine with which to communicate. For the shared key, set a value
that consists of a combination of eight or more alphanumeric characters and that cannot be easily guessed.
Do not set a value that can be easily guessed from your birthday, employee identification number, and the
like.
[Digital Signature] has a higher security strength than [Pre-Shared Key].
The ISO15408 evaluation for the machine is performed on the basis of the [Pre-Shared Key].
Do not use DES or 3DES in the encryption algorithm of [IKE Settings]. Use AES. [Main Mode] and [Aggressive
Mode] are available in [Negotiation Mode]. The default setting is [Main Mode]. The administrator should op-
erate the machine with the [Main Mode] setting.
Leaking the pre shared key for IPsec set on the MFP increases the risk of spoofing of the MFP, etc. Therefore,
set machine-specific pre shared keys and manage them safely.
An illegal DNS response (e.g., a response exceeding 2048 bytes) made by the DNS server may cause the
TOE to perform an unexpected operation. The administrator should control such that the DNS server does
not make such a response. It should also be noted that setting of multiple DNS servers increases the risk.
Note that unencrypted communication can be established if the IPsec setting is not made over the whole ad-
dress range (0 to 255 for IPv4) and an IP address outside the range is assigned to a client PC.
Select an ESP Encryption Algorithm from AES-GCM, AES-CBC, and AES-CTR for IPsec SA Settings. Fur-
thermore, when AES-CBC or AES-CTR is selected, select an ESP Authentication Algorithm from SHA-1,
SHA-2, and AES-XCBC.
NOTICE
The administrator of the machine should make sure that SSL encryption communication is not performed with
the SSL set in SSL v3.
Do not use an SSL certificate that is electronically signed by MD5, as an increased risk results of data to be
protected being tampered with or leaked.
To eliminate the risk of the data to be protected being tampered with or leaked, refer to the recommended
ciphers list disclosed by, for example, NIST and CRYPTREC and use the appropriate cryptographic tech-
nique.
Print functions
Only the following procedures are guaranteed for the print functions performed from the client PC.
- Use IPPS printing for the print functions performed using the printer driver.
- Use direct printing from the Web Connection for the print functions not performed via the printer driver.
IPP printing
IPP (Internet Printing Protocol) is a function that allows printing via the Internet by using the HTTP (HyperText
Transfer Protocol) of the TCP/IP Protocol. IPPS (IPP over SSL/TLS) is the type of IPP that performs the SSL
encryption communication.
<Installing printer driver>
To perform IPPS printing, the printer driver must be installed. Start the printer addition wizard of the Windows
Vista/7/8/8.1/Server 2008/Server 2008 R2/Server 2012/Server 2012 R2 and type [DNS Host Name] and
[Default DNS Domain Name] of this machine in the following format in the "URL" field.
https://[DNS host name].[default DNS domain name]/ipp
For [DNS host name] and [default DNS domain name], specify the names set with the DNS server.
1 From "Continue to this website," call the Web Connection window to the screen.
2 Click "Certificate Error" to display the certificate. Then, click "Install Certificate" to install the certificate.
3 Display the physical stores. Then, deploy the certificate, which has earlier been exported, in "Local
Computer" of "Trusted Root Certification Authorities" to thereby import the certificate.
Fax functions
An optional Fax Kit is required for using fax functions. Contact your Service Representative.
USB keyboard
The USB keyboard is not used for the ISO15408 evaluation for this machine.
Do not use a USB keyboard.
Type Description
Public User Box * This is the public box in which all users can store documents and use
them. Note that a password is set for the box and the set password
needs to be entered before access can be gained to the box.
Personal User Box * This is a personal box. Only users who have logged in to the system
can store and use documents in the Personal User Box.
Group User Box * This is a group box. Only users belonging to the same department (or
group) can store and use documents in the Group User Box.
Secure Print Box When you print a document from the PC or when you select the Se-
cure Print function using the printer driver, this data file is stored in the
Secure Print User Box.
Memory RX Box When a facsimile is received by the Memory RX function, it is stored
in the Memory RX User Box.
ID & Print Box When you print a document from the PC, the files transferred with the
ID & Print function are stored in the ID & Print User Box.
Annotation User Box When a stored file is printed out or sent to another user, its date, time
and any annotations are added to this box automatically.
Password Encrypted PDF Box When a password protected PDF file is printed out or stored in the
User Box, the file is stored in the Password Encrypted PDF User Box.
2 Administrator Operations
4 Touch [OK].
% If a wrong Administrator Password is entered, a message that tells that the Administrator Password
does not match appears. Enter the correct Administrator Password.
% If the Enhanced Security Mode is set to [ON], entry of a wrong password is counted as unauthorized
access. If a wrong Administrator Password is entered a predetermined number of times (once to
three times) or more set by the administrator, a message appears saying that the machine accepts
no more Administrator Passwords because of unauthorized access for any subsequent entry of the
Administrator Password. The machine is then set into an access lock state.
To cancel the access lock state, settings must be made by the Service Engineer; or, turn off, and
then turn on, the main power switch of the machine. If the main power switch is turned off and
on, the access lock state is canceled after the lapse of time set for [Release Time Settings]. When
the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after turn-
ing it off. If there is no wait period between turning the main power switch off, then on again, the
machine may not function properly.
5 Press the Reset key to log off from the Administrator Mode.
2 Enter the user name and the password, then touch [OK].
6 Press the Reset key to log off from the Administrator Mode.
5 Select the "Administrator (Admin Mode)" in the Administrator, and enter the Administrator Password in
the "Password" box.
6 Click [OK].
% If a wrong Administrator Password is entered, a message that tells that the authentication has failed
appears. Enter the correct Administrator Password.
% If the Enhanced Security Mode is set to [ON], entry of a wrong password is counted as unauthorized
access. If a wrong Administrator Password is entered a predetermined number of times (once to
three times) or more set by the administrator, a message appears saying that the machine accepts
no more Administrator Passwords because of unauthorized access for any subsequent entry of the
Administrator Password. The machine is then set into an access lock state.
To cancel the access lock state, settings must be made by the Service Engineer; or, turn off, and
then turn on, the main power switch of the machine. If the main power switch is turned off and
on, the access lock state is canceled after the lapse of time set for [Release Time Settings]. When
the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after turn-
ing it off. If there is no wait period between turning the main power switch off, then on again, the
machine may not function properly.
7 Click [Logout].
8 Click [OK].
This allows you to log off from the Admin Mode.
5 Select "Administrator (Admin Mode)" in the Registered User and enter the user name in the "User
Name" box and the user password in the "Password" box.
% If "Administrator (Admin Mode)" is selected, the settings for the machine system and network can
be registered or changed.
% When accessing the Admin Mode using the Web Connection, enter the same User Password as
that for the machine.
6 Click [OK].
% If a user administrator enters a wrong User Password, a message that tells that the authentication
has failed appears. Enter the correct User Password.
% If the Enhanced Security Mode is set to [ON], the entry of a wrong User Password is counted as
unauthorized access. If a wrong User Password is entered a predetermined number of times (once
to three times) or more set by the administrator, a message appears saying that the machine ac-
cepts no more User Passwords because of unauthorized access for any subsequent entry of the
User Password. The machine is then set into an access lock state. To cancel the access lock state,
the administrator must perform the Release Setting. Contact the administrator.
7 Click [Logout].
8 Click [OK].
This allows you to log off from the User Administrator Mode.
Tips
The authority relating to box settings is the same as that of Administrator Mode.
2 Enter "admin" in [User Name]. Enter the password set for this machine in [Password].
3 Touch [OK].
6 Press the Access key or touch [Close] to log off from the User Mode.
5 Select "Administrator (User Mode)" in the Administrator and enter the Administrator Password in the
"Password" box.
6 Click [OK].
% If a wrong Administrator Password is entered, a message that tells that the authentication has failed
appears. Enter the correct Administrator Password.
% If the Enhanced Security Mode is set to [ON], entry of a wrong password is counted as unauthorized
access. If a wrong Administrator Password is entered a predetermined number of times (once to
three times) or more set by the administrator, a message appears saying that the machine accepts
no more Administrator Passwords because of unauthorized access for any subsequent entry of the
Administrator Password. The machine is then set into an access lock state.
To cancel the access lock state, settings must be made by the Service Engineer; or, turn off, and
then turn on, the main power switch of the machine. If the main power switch is turned off and
on, the access lock state is canceled after the lapse of time set for [Release Time Settings]. When
the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after turn-
ing it off. If there is no wait period between turning the main power switch off, then on again, the
machine may not function properly.
9 Click [Logout].
10 Click [OK].
This allows you to log off from the User Mode.
Setting the Enhanced Security Mode to [ON] changes the setting values of the following functions.
NOTICE
If an attempt is made to change a setting that has been changed as a result of setting the Enhanced Security
Mode to [ON], a screen may appear indicating that the Enhanced Security Mode is to be canceled. Note that
executing this screen will cancel the Enhanced Security Mode.
The description "not to be changed" given in parentheses in the table below indicates that the specific setting
cannot be changed with the Enhanced Security Mode set to [ON].
Function Name Factory Setting When Enhanced Security Mode is set to [ON]
Password Rules Disable Enable (not to be changed)
*
If [Enable] is set for Password Rules, the types and
number of characters to be used for each password are
limited.
For details of the Password Rules, see page 1-13.
Prohibited Functions Mode 1 Mode 2 (not to be changed): Three times is set.
When Authentication Er- * The number of times can be changed to once, twice,
ror or three times.
Release Time settings 5 min. The setting value should be 5 min. or more (no value less
than 5 can be set)
Confidential Document Mode 1 Mode 2 (not to be changed)
Access Method * In association with Prohibit Functions When Authenti-
cation Error, the method is changed from authentication
using Secure Print ID and password (Mode 1) to that us-
ing the password with the Secure Print document first
narrowed down by Secure Print ID (Mode 2).
Secure Print User Box Thumbnail View, Only Detail View is enabled before password authenti-
Preview Detail View, and cation (Mode 2)
Document De-
tails are enabled
Public User Access Restrict Restrict (not to be changed)
1 Call the Administrator Mode on the display from the control panel.
2 Touch [Forward].
% The following screen appears if the previously required settings are yet to be made by the Service
Engineer. Contact your Service Representative.
7 Touch [OK].
1 Call the Security Settings screen on the display from the control panel.
3 Select [ON] to enable the Enhanced Security Mode and touch [OK].
% The following screen appears if the previously required settings are yet to be made by the adminis-
trator. Make the necessary settings according to the corresponding set procedure.
4 Any external applications registered using OpenAPI will be deleted when the Enhanced Security Mode
is set to [ON]. A confirmation message appears. Select [Yes] and touch [OK].
5 Make sure that a message appears prompting you to turn OFF and then ON the main power switch.
Now, turn OFF and then turn ON the main power switch.
% When the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after
turning it off. if there is no wait period between turning the main power switch off, then on again,
the machine may not function properly.
1 Call the Security Settings screen on the display from the control panel.
5 Touch [OK].
% If the entered FW Update (USB) Password does not meet the Password Rules, a message that tells
that the entered FW Update (USB) Password cannot be used appears. Enter the correct FW Update
(USB) Password. For details of the Password Rules, see page 1-13.
3 In the menu, set [USB Update] to [Password Priority] in [FW Update (USB) Permission Setting].
5 Click [OK].
% If the entered FW Update (USB) Password in the [Password] box does not meet the Password
Rules, a message that tells that the entered FW Update (USB) Password cannot be used appears.
Enter the correct FW Update (USB) Password. For details of the Password Rules, see page 1-13.
Mode Description
Mode 1 If authentication fails, the authentication operation (entry of the password) is prohibited
for 5 sec.
Mode 2 If authentication fails, the authentication operation (entry of the password) is prohibited
for 5 sec. The number of times, in which authentication fails, is also counted and, when
the failure count reaches a predetermined value, the authentication operation is prohib-
ited and the machine is set into an access lock state.
NOTICE
For details of boxes subject to the User Box authentication, see page 1-17.
If the access lock state of the Administrator Authentication is canceled by the Service Engineer, the setting of
the Release Time Settings function is not applied.
Making any of the following settings when the Enhanced Security Mode is set to [ON] will cancel the En-
hanced Security Mode.
- Changing [Prohibited Functions When Authentication Error] to [Mode 1]
- Changing the check count for [Prohibited Functions When Authentication Error] to four times or more
- Setting [Release Time Settings] to 1 to 4 min.
1 Call the Security Settings screen on the display from the control panel.
% Select [Mode 2] when the Enhanced Security Mode is set to [ON]. Selecting [Mode 1] will cancel the
Enhanced Security Mode.
% Set three times or less when the Enhanced Security Mode is set to [ON]. Setting four times or more
will cancel the Enhanced Security Mode.
% To change the check count, touch [+] to increase the count or [-] to decrease it.
6 Touch [C] and, from the keypad, enter the time, after the lapse of which the access lock state of the
Administrator Authentication is canceled.
7 Touch [OK].
NOTICE
For details of boxes subject to the User Box authentication, see page 1-17.
Never allow any general user to know the Administrator Password.
Forgetting the Administrator Password requires that a setting be made by the service engineer. Call your Ser-
vice Representative.
It is also possible for the service engineer to cancel the state of Prohibited Functions When Authentication
Error (access lock state) of the Administrator Authentication. Contact your Service Representative.
1 Call the Prohibited Functions When Authentication Error screen on the display from the control panel.
2 Touch [Release].
% The Remote Panel function cannot be used when the Enhanced Security Mode is set to [ON].
4 Touch [OK].
This clears the unauthorized access check count of the specific function selected in step 4 and cancels
the operation prohibited state.
Mode Description
[ON (MFP)] The authentication function of this machine is used for user authenti-
cation.
[External Server Authentication] Interacts with the authentication server used for user authentication in
(Active Directory only) the operating environment.
[Main + External Server] (Active The authentication function of the machine may also be used, in con-
Directory only) sideration of a possible problem occurring in the external authentica-
tion server.
NOTICE
Changing the Account Track setting erases all user and account information data that has previously been
registered. At this time, Personal User Boxes owned by the users who are deleted and Group User Boxes
owned by the accounts that are deleted may be deleted or changed to Public User Boxes.
If the boxes are changed to Public User Boxes and if the password set for a particular box before this change
does not meet the Password Rules, no access can be made to the Public User Box, to which that specific
box was changed. In this case, the administrator must first newly set a password that meets the Password
Rules. For details of the Password Rules, see page 1-13.
If [External Server Authentication] is selected for the authentication method, be sure to select [Active Direc-
tory] in the External Server Settings.
1 Call the Administrator Mode on the display from the control panel.
% To use the External Server, the External Server must be registered in advance. For how to make the
External Server Settings, see page 2-30.
6 Touch [OK].
8 Touch [ ].
9 Select [Synchronize User Authentication & Account Track] and touch [Synchronize].
10 Touch [OK].
11 A message appears that prompts you to clear the use control data. Now, select [Yes] and touch [OK].
1 Call the User Authentication/Account Track screen on the display from the control panel.
3 Touch the specific Sever Registration key, in which no sever has been registered.
4 Touch [New].
8 From the keyboard, enter the Domain Name and touch [OK].
9 Touch [OK].
11 Touch [OK].
12 Touch [Close].
% If two or more External Servers have been registered, select any desired server and touch [Set as
Default].
1 Call the User Authentication/Account Track screen on the display from the control panel.
5 Select [ON].
6 Touch [OK].
% If [ON] is set, the document is stored as ID & Print document even if [Print] is selected on the printer
driver side.
% Even if [OFF] is set, the document is stored as ID & Print document if [ID & Print] is selected on the
printer driver side.
Setting Auth. Operation Setting when print Documents are Stored Function
0 For the procedure to call the Administrative Settings screen on the display, see steps 1 through 3 of
page 2-32.
0 Do not leave the machine with the setting screen of Administrator Mode left shown on the display. If it
is absolutely necessary to leave the machine, be sure first to log off from the Administrator Mode.
1 Call the Administrative Settings screen on the display from the control panel.
4 Touch [OK].
Tips
Processing of a specific job, however, takes precedence over the System Auto Reset function. That is, even
if a predetermined period of time elapses during which no operations are performed, once the processing of
the specific job has been started, the System Auto Reset function does not cause the user to log off from the
mode. The user logs off from the mode after the lapse of a predetermined period of time after the processing
of the specific job is completed.
1 Call the Administrator Mode on the display from the control panel.
5 Touch [C] and enter the period of time (1 min. to 9 min.) after which System Auto Reset is activated from
the keypad.
6 Touch [OK].
Tips
- If [External Server Authentication] (Active Directory) is set for the authentication method, it is not possi-
ble to make user registration or change a User Password from the control panel. To register or change
a user, make the settings on the server side. If Data Administrator is used for registering user informa-
tion, however, the user name must match that registered in the External Server. Further, a User Pass-
word can be set, but is not to be used for authentication.
- If [External Server Authentication] (Active Directory) is set for the authentication method and if a user
not registered with this machine is authenticated through user authentication, that particular user name
is automatically registered in the machine.
- If [External Server Authentication] (Active Directory) is set for the authentication method and if a user
registered with this machine is authenticated through user authentication, that particular user name,
along with the External Server name, is automatically registered in the machine. No two User Names
registered in an External Server may be alike.
- If the user authentication method is changed between [ON (MFP)] and [External Server Authentication],
the user information registered under the previous authentication method cannot be used under the
new authentication method.
- If [External Server Authentication] is set for the authentication method, a log-on attempt made success-
fully by a user who has been registered in the external server causes a predetermined default authority
to be given to this particular user. Make the individual authority setting thereafter. Once the individual
authority setting has been made, that individual authority setting is valid and assigned to the user each
successful log-on attempt made by the user.
- If the user authentication method is to be changed, be sure first to delete all user information used under
the old authentication method and then change the user authentication method as necessary.
When a registered user is deleted, the Personal User Box owned by the user who has been deleted can
be deleted or changed to a Public User Box. Deleting a user also delete documents stored in ID & Print
and Password Encrypted PDF boxes for the user.
If the boxes are changed to Public User Boxes and if the password set for a particular box before this
change does not meet the Password Rules, no access can be made to the Public User Box, to which
that specific box was changed. In this case, the administrator must first newly set a password that
meets the Password Rules. For details of the Password Rules, see page 1-13.
- If [ON (MFP)] is set for the authentication method, a specific registered user may be temporarily sus-
pended from using the machine or a suspended user may be allowed to use the machine again. While
a user is suspended from using the machine, he or she cannot log onto the machine.
1 Call the User Authentication Settings screen on the display from the control panel.
3 Select a specific User Registration key, in which no user has been registered, and touch [Edit].
% To change settings for a registered user, select the registered user in question and touch [Edit].
% To delete a registered user, select the registered user in question and touch [Delete]. The following
screen appears if the user to be deleted owns a Personal User Box. Select whether to delete the
Personal User Box or change it to the Public User Box.
% If the boxes are changed to Public User Boxes and if the password set for a particular box before
this change does not meet the Password Rules, no access can be made to the Public User Box, to
which that specific box was changed. In this case, the administrator must first newly set a password
that meets the Password Rules. For details of the Password Rules, see page 1-13.
6 Touch [OK].
% If the entered User Password does not meet the Password Rules, a message that tells that the en-
tered User Password cannot be used appears. Enter the correct User Password. For details of the
Password Rules, see page 1-13.
% If the entered User Password does not match, a message that tells that the User Password does
not match appears. Enter the correct User Password.
% If Account Name is not registered, Account Track becomes necessary even with [Synchronize] set
for [Synchronize User Authentication & Account Track]. Account Track is, however, necessary only
for the first time. Once any account is authenticated, that particular account is registered for Ac-
count Name. The machine can thereafter be used only through User Authentication.
9 Touch [OK].
11 Touch [OK].
% If the boxes are changed to Public User Boxes and if the password set for a particular box before
this change does not meet the Password Rules, no access can be made to the Public User Box, to
which that specific box was changed. In this case, the administrator must first newly set a password
that meets the Password Rules. For details of the Password Rules, see page 1-13.
6 Click [OK].
% If the entered User Password does not meet the Password Rules, a message that tells that the en-
tered User Password cannot be used appears. Enter the correct User Password. For details of the
Password Rules, see page 1-13.
% If the entered User Password does not match, a message that tells that the User Password does
not match appears. Enter the correct User Password.
7 Check the message that tells that the setting has been completed.
Tips
- A specific registered account may be temporarily suspended from using the machine or a suspended
account may be allowed to use the machine again. While an account is suspended from using the ma-
chine, it cannot log onto the machine. If a registered account to which a particular user belongs is sus-
pended from using the machine, that particular user is also unable to log onto the machine.
- [Pause] setting of the account is enabled even if [External Server Authentication] (Active Directory) is set
for the authentication method.
- An input of an Account Password during an initial log-on procedure establishes the account to which
the user belongs. Be careful that leakage of the Account Password may cause an unintended account
to be set.
- A change made in the Account Password requires that the new Account Password be input during the
initial log-on procedure after the change. Make sure that only the user involved is notified of the new
Account Password as soon as possible.
1 Call the User Authentication/Account Track screen on the display from the control panel.
4 Select a specific Account Registration key, in which no account has been registered, and touch [Edit].
% To change settings for a registered account, select the registered account in question and touch
[Edit].
% To delete a registered account, select the registered account in question and touch [Delete]. The
following screen appears if the account to be deleted owns a Group User Box. Select whether to
delete the Group User Box or change it to the Public User Box.
% If the boxes are changed to Public User Boxes and if the password set for a particular box before
this change does not meet the Password Rules, no access can be made to the Public User Box, to
which that specific box was changed. In this case, the administrator must first newly set a password
that meets the Password Rules. For details of the Password Rules, see page 1-13.
7 Touch [OK].
% If the entered Account Password does not meet the Password Rules, a message that tells that the
entered Account Password cannot be used appears. Enter the correct Account Password. For de-
tails of the Password Rules, see page 1-13.
% If the entered Account Password does not match, a message that tells that the Account Password
does not match appears. Enter the correct Account Password.
9 Touch [OK].
% If the boxes are changed to Public User Boxes and if the password set for a particular box before
this change does not meet the Password Rules, no access can be made to the Public User Box, to
which that specific box was changed. In this case, the administrator must first newly set a password
that meets the Password Rules. For details of the Password Rules, see page 1-13.
6 Click [OK].
% If the entered Account Password does not meet the Password Rules, a message that tells that the
entered Account Password cannot be used appears. Enter the correct Account Password. For de-
tails of the Password Rules, see page 1-13.
% If the entered Account Password does not match, a message that tells that the Account Password
does not match appears. Enter the correct Account Password.
7 Check the message that tells that the setting has been completed.
Tips
- If [External Server Authentication] (Active Directory) is set for the authentication method, the same Per-
sonal User Box name as that registered with the machine can be created and registered along with the
External Server name. No two Personal User Box names registered in an External Server may be alike.
- When a document is saved in a box with a box number yet to be registered specified from the PC, the
Personal User Box owned by the user who logged on through User Authentication is automatically reg-
istered.
1 Call the Administrator Mode on the display from the control panel.
3 Touch [Create User Box], and select the desired box type.
% To delete a User Box, select the desired user box key and touch [Delete]. A confirmation message
appears. Select [Yes] and touch [OK] to delete the specified User Box.
5 Touch [Password].
% When [Personal] is selected, [Change Owner] is displayed. Then, select the desired owner name.
% When [Group] is selected, [Change Account Name] is displayed. Then, select the desired account
name.
8 Touch [OK].
% Set a User Box Password that meets the Password Rules. For details of the Password Rules, see
page 1-13.
% If the entered User Box Password does not match, a message that tells that the User Box Password
does not match appears. Enter the correct User Box Password.
10 Touch [OK].
% Be sure to enter the User Box Number, User Box Name, User Box Password, and Retype User Box
Password.
% A User Box Number that already exists cannot be redundantly registered.
5 Click [OK].
% Set a User Box Password that meets the Password Rules. For details of the Password Rules, see
page 1-13.
% If the entered User Box Password does not match, a message that tells that the User Box Password
does not match appears. Enter the correct User Box Password.
% If no Owner Name is entered, a message appears that tells that no Owner Names have been en-
tered. Enter the correct Owner Name.
% If a user name not registered with the machine is entered in the "Owner Name" box, a message ap-
pears that tells that the Owner Name entered in the box is illegal. Enter the correct Owner Name.
% If no Account Name is entered, a message appears that tells that no Account Names have been en-
tered. Enter the correct Account Name.
% If an account name not registered with the machine is entered in the "Account Name" box, a mes-
sage appears that tells that the Account Name entered in the box is illegal. Enter the correct Account
Name.
1 Call the User Box setting screen on the display from the control panel.
% [Change Owner] appears if the Box Type is changed to [Personal]. Select the desired owner name.
% [Change Account Name] appears if the Box Type is changed to [Group]. Select the desired account
name.
% Set a User Box Password that meets the Password Rules. For details of the Password Rules, see
page 1-13.
6 Touch [OK].
7 Touch [Password].
9 Touch [OK].
% Set a User Box Password that meets the Password Rules. For details of the Password Rules, see
page 1-13.
% If the entered User Box Password does not match, a message that tells that the User Box Password
does not match appears. Enter the correct User Box Password.
10 Touch [OK].
4 Click the "User Box Owner is changed." check box and change Type and Owner Name (or Account
Name).
% If [Personal] is selected from the User Box Type pull-down menu, click [User List] and select the user
from the registered user list. Or, directly enter in the "Owner Name" box the previously registered
User Name.
5 Click the "User Box Password is changed." check box and enter the User Box Password.
6 Click [OK].
% Set a User Box Password that meets the Password Rules. For details of the Password Rules, see
page 1-13.
% If the entered User Box Password does not match, a message that tells that the User Box Password
does not match appears. Enter the correct User Box Password.
% If no Owner Name is entered, a message appears that tells that no Owner Names have been en-
tered. Enter the correct Owner Name.
% If a user name not registered with the machine is entered in the "Owner Name" box, a message ap-
pears that tells that the Owner Name entered in the box is illegal. Enter the correct Owner Name.
% If no Account Name is entered, a message appears that tells that no Account Names have been en-
tered. Enter the correct Account Name.
% If an account name not registered with the machine is entered in the "Account Name" box, a mes-
sage appears that tells that the Account Name entered in the box is illegal. Enter the correct Account
Name.
1 Call the Administrator Mode on the display from the control panel.
6 Touch [OK].
3 Click [Function Setting] - [RX Data Operation Settings] from the menu.
5 Select the check box under [Password is changed] and set the Memory RX User Box Password that
should consist of eight characters.
% Make sure that the Memory RX User Box Password consists of eight characters.
6 Click [OK].
1 Call the Security Settings screen on the display from the control panel.
4 Touch [OK].
% If a wrong Administrator Password is entered, a message that tells that the Administrator Password
does not match appears. Enter the correct Administrator Password.
% If the Enhanced Security Mode is set to [ON], entry of a wrong password is counted as unauthorized
access. If a wrong Administrator Password is entered a predetermined number of times (once to
three times) or more set by the administrator, the Utility screen appears and the machine is set into
an access lock state.
To cancel the access lock state, settings must be made by the Service Engineer; or, turn off, and
then turn on, the main power switch of the machine. If the main power switch is turned off and
on, the access lock state is canceled after the lapse of time set for [Release Time Settings]. When
6 Touch [OK].
% If the entered Administrator Password does not meet the Password Rules, a message that tells that
the entered Administrator Password cannot be used appears. Enter the correct Administrator Pass-
word. For details of the Password Rules, see page 1-13.
% If the entered Administrator Password does not match, a message that tells that the Administrator
Password does not match appears. Enter the correct Administrator Password.
4 Select the "Password is changed" check box. Enter the currently registered Administrator Password
and a new Administrator Password. Then, to make sure that you have entered the correct new pass-
word, enter the new Administrator Password once again.
5 Click [OK].
% If a wrong Administrator Password is entered in the "Current Administrator Password" box, a mes-
sage that tells that the Administrator Password does not match appears. Enter the correct Admin-
istrator Password.
% If the Enhanced Security Mode is set to [ON], entry of a wrong password is counted as unauthorized
access. If a wrong Administrator Password is entered a predetermined number of times (once to
three times) or more set by the administrator, the Utility screen appears and the machine is set into
an access lock state.
To cancel the access lock state, settings must be made by the Service Engineer; or, turn off, and
then turn on, the main power switch of the machine. If the main power switch is turned off and
on, the access lock state is canceled after the lapse of time set for [Release Time Settings]. When
the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after turn-
ing it off. If there is no wait period between turning the main power switch off, then on again, the
machine may not function properly.
% If the entered Administrator Password in the "New Administrator Password" box does not meet the
Password Rules, a message that tells that the entered Administrator Password cannot be used ap-
pears. Enter the correct Administrator Password. For details of the Password Rules, see page 1-13.
% If the entered Administrator Password in the "New Administrator Password" box and "Re-type New
Administrator Password" box does not match, a message that tells that the Administrator Password
does not match appears. Enter the correct Administrator Password.
6 Click [OK].
Tips
When an Encryption Key (encryption word) is set using HDD Encryption Setting, an Encryption Key with a key
length of 256 bits is generated. The generated encryption key is used to encrypt or decrypt data through AES
encryption algorithm.
6 Touch [OK].
% If the entered Encryption Key does not meet the setting requirements, a message that tells that the
entered Encryption Key cannot be used appears. Enter the correct Encryption Key.
% If the entered Encryption Key does not match, a message that tells that the Encryption Key does not
match appears. Enter the correct Encryption Key.
7 Make sure that a message appears prompting you to turn OFF and then ON the main power switch.
Now, turn OFF and then turn ON the main power switch.
% When the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after
turning it off. if there is no wait period between turning the main power switch off, then on again,
the machine may not function properly.
8 The following screen appears after the machine has been restarted.
9 Call the Administrator Mode on the display from the control panel.
% For the procedure to call the Administrator Mode on the display, see page 2-2.
12 Make sure that a message appears prompting you to turn OFF and then ON the main power switch.
Now, turn OFF and then turn ON the main power switch.
% When the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after
turning it off. if there is no wait period between turning the main power switch off, then on again,
the machine may not function properly.
1 Call the Encryption Key entry screen on the display from the control panel.
2 Enter the currently registered 20 characters Encryption Key from the keyboard.
5 Touch [OK].
% If the entered Encryption Key does not meet the setting requirements, a message that tells that the
entered Encryption Key cannot be used appears. Enter the correct Encryption Key.
% If the entered Encryption Key does not match, a message that tells that the Encryption Key does not
match appears. Enter the correct Encryption Key.
% When the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after
turning it off. if there is no wait period between turning the main power switch off, then on again,
the machine may not function properly.
Tips
- If a job being processed is abnormally terminated, the residual data is deleted through Overwrite HDD
Data.
- If the machine is turned off during an Overwrite HDD Data sequence, the Overwrite HDD Data sequence
is resumed automatically after the machine is turned on again.
- If an Overwrite HDD Data sequence being performed is interrupted by, for example, a fault, a response
is detected at 30-sec. intervals and the Overwrite HDD Data sequence, if found interrupted, is resumed
automatically.
0 For the procedure to call the Storage Management Settings screen on the display, see steps 1 and 2
of page 2-64.
0 Do not leave the machine with the setting screen of Administrator Mode left shown on the display. If it
is absolutely necessary to leave the machine, be sure first to log off from the Administrator Mode.
0 Executing HDD Format erases data in the HDD. It is recommended that important data should be saved
in a backup medium in advance. Execution of HDD Format will also reset the setting values of different
functions to the default values. Set the Enhanced Security Mode to [ON] again. For the functions whose
settings are reset to the default values, see page 2-14.
Item Description
[Mode 1] Overwritten with "0x00"
[Mode 2] Overwritten with "0x00" - Overwritten with "0xff" - Overwritten with letter "a"
(0x61) - Verified
% [No] is the default setting.
4 Touch [OK].
Mode Description
[Mode 1] Overwrites once with "0x00."
[Mode 2] Overwrites with "random numbers" - "random numbers" - "0x00."
[Mode 3] Overwrites with "0x00" - "0xff" - "random numbers" - verifies.
[Mode 4] Overwrites with "random numbers" - "0x00" - "0xff."
[Mode 5] Overwrites with "0x00" - "0xff" - "0x00" - "0xff."
[Mode 6] Overwrites with "0x00" - "0xff" - "0x00" - "0xff" - "0x00" - "0xff" - "random numbers."
[Mode 7] Overwrites with "0x00" - "0xff" - "0x00" - "0xff" - "0x00" - "0xff" - "0xaa."
[Mode 8] Overwrites with "0x00" - "0xff" - "0x00" - "0xff" - "0x00" - "0xff" - "0xaa" - verifies.
1 Call the Storage Management Settings screen on the display from the control panel.
5 Make sure that a message appears prompting you to turn OFF and then ON the main power switch.
Now, turn OFF and then turn ON the main power switch.
% Check that all data has been overwritten and erased properly. Data is not erased properly if an error
occurs during the procedure. For details, contact your Service Representative.
% When the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after
turning it off. if there is no wait period between turning the main power switch off, then on again,
the machine may not function properly.
% After the main power switch has been turned on, quickly turn it off and give the machine to the
Service Engineer. If the Overwrite All Data function is executed by mistake, contact the Service En-
gineer. For details, contact your Service Representative.
1 Call the Security Details screen on the display from the control panel.
3 Select [Yes] and touch [On] of the specific type of log to be obtained.
% Under [Overwrite], whether to enable writing over old Job Logs when the Job Log space in the HDD
is full of old Job Logs can be selected.
Item Description
[Allow] Allows Job Logs to be continuously stored by writing over old Job Logs in chrono-
logical order even when the Job Log space in the HDD is full.
[Restrict] Displays, when the Job Log space in the HDD is full, an alarm indicating that no
more Job Logs can be stored and stops storing Job Logs. After this event, no
more jobs will be accepted.
% If [Allow] is set for [Overwrite], illegal operations performed from an external environment (such as
repeated log-on procedures performed over the network) make the Job Log space full of data within
a short period of time, so that older Job Log data is deleted. To avoid such a situation, the admin-
istrator should download the Job Log data at regular intervals or select [Restrict] for [Overwrite]. For
details of downloading of the Job Log data, see page 2-76.
% If [Restrict] is selected for [Overwrite], the administrator should download Job Log data at regular
intervals to thereby delete Job Logs from the machine and to ensure that the Job Log space in the
HDD is not full. For details of downloading of the Job Log data, see page 2-76.
% If the setting for [Overwrite] is switched from [Restrict] to [Allow] after saving of Job Logs is started,
overwriting is enabled with the Job Logs saved so far left as they are.
% If the setting for [Overwrite] is switched from [Allow] to [Restrict] after saving of Job Logs is started,
overwriting is prohibited with all previously saved Job Logs deleted.
% Touching [Erase Job Log] erases all Job Logs saved in the machine.
4 Click [OK].
When the machine is restarted, it starts obtaining Job Logs.
% If no Job Logs are saved in the machine, the machine displays an error message indicating that no
Job Log data to be created is available.
% When the Job Log data is successfully created, the Job Log in the machine is deleted.
% The sequence of creating the Job Log data continues even when the browser is closed during the
creating sequence. Restart the Web Connection and check that the Job Log data has been creat-
ed.
% If any job logs have not been obtained, download them before creating new job log data. The job
logs that have not been obtained are deleted when the new job log data is created.
5 Click [OK].
8 Click [Download].
This starts downloading the job log data.
% If a message appears indicating that a Job Log data file size is too large to be output, try to create
the Job Log data yet to be obtained after downloading is completed.
% Only the administrator may handle the Job Log data that has been downloaded.
% The administrator should download the Job Log data at regular intervals to thereby ensure that the
machine is properly used.
1 Call the System Settings screen on the display from the control panel.
3 Select the item to be set. Then, touch [C] and next set the time-of-day and date.
Touching [Set Date] lets the NTP server to adjust the current time/date automatically.
4 Touch [OK].
% If [Auto Time Adjustment] is set to [On], the machine connects to the NTP server at regular intervals
to thereby adjust the time-of-day and date. In this case, use [Polling Interval] to set the interval at
which the time/date adjustment is to be made (unit: hours).
7 Touch [OK].
% To correct the time-of-day, use [Time Zone] to set the time difference from the coordinated universal
time (UTC).
5 Check that a message indicating that the setting is completed appears. Then, click [OK].
% To correct the time-of-day using the NTP server, make the following settings.
7 Click [ON] from the pull-down menu of [Time Adjustment Setting], and make the necessary settings.
% If [Auto Time Adjustment] is set to [ON], the machine connects to the NTP server at regular intervals
to thereby adjust the time-of-day and date. In this case, use [Polling Interval] to set the interval at
which the time/date adjustment is to be made (unit: hours).
8 Click [Adjust].
9 Check that a message indicating that the adjustment is completed appears. Then, click [OK].
1 Call the System Settings screen on the display from the control panel.
3 Select [Yes]. Then, touch [C] and enter time to be advanced as the daylight saving time.
4 Touch [OK].
6 Select [Weekly] or [Daily]. Then, specify the start date/time and the end date/time of a period of time to
which the daylight saving time is applicable.
7 Touch [OK].
4 Select [ON] from the pull-down menu of [Daylight Saving Time], and enter time to be advanced as the
daylight saving time.
From the [Specify Method] pull-down menu, select [Weekly] or [Day] and specify the start date/time and
the end date/time of a period of time to which the daylight saving time is applicable.
5 Click [OK].
6 Check that a message indicating that the adjustment is completed appears. Then, click [OK].
% If data entered for each item does not meet the requirements, a message appears that tells that the
data entered is wrong.
6 Click [OK].
The certificate can now be registered.
0 For call the PKI Settings screen on the display, see steps 1 and 2 of page 2-92.
0 Do not leave the machine with the Admin Mode setting screen left shown on the display. If it is abso-
lutely necessary to leave the machine, be sure first to log off from the Admin Mode.
1 Start Web Connection and call the PKI Settings screen on the display.
3 Set "Mode using SSL/TLS" and "Encryption Strength" and click [OK].
% Select "Admin. Mode and User Mode" for "Mode using SSL/TLS."
% For encryption strength, select the strong "AES-256, 3DES-168." Note, however, selecting "AES-
256, 3DES-168" does not allow the encryption strength to connect in 3DES.
% The Enhanced Security Mode is canceled, if setting containing strength lower than AES/3DES is se-
lected when the Enhanced Security Mode is [ON].
% Cancel the selection of "SSLv3" of SSL/TLS Version Setting.
4 Click [OK].
1 Start Web Connection and call the PKI Settings screen on the display.
2 Click [Setting].
4 Click [OK].
1 Call the Administrator Mode screen on the display from the control panel.
7 Touch [OK].
8 Touch [OK].
% If a message appears that prompts you to turn OFF and ON the main power switch, turn OFF and
ON the main power switch. When the main power switch is turned off, then on again, wait at least
10 seconds to turn it on after turning it off. If there is no wait period between turning the main power
switch off, then on again, the machine may not function properly.
4 Select [Manual Setting] from the IP Address Setting Method pull-down menu.
6 Click [OK].
1 Call the TCP/IP Settings screen on the display from the control panel.
3 Touch [OK].
% If a message appears that prompts you to turn OFF and ON the main power switch, turn OFF and
ON the main power switch. When the main power switch is turned off, then on again, wait at least
10 seconds to turn it on after turning it off. If there is no wait period between turning the main power
switch off, then on again, the machine may not function properly.
1 Start the Web Connection and call the TCP/IP Setting screen on the display.
4 Click [OK].
1 Call the Network Settings screen on the display from the control panel.
5 Touch [OK].
6 Touch [Close].
% If a message appears that prompts you to turn OFF and ON the main power switch, turn OFF and
ON the main power switch. When the main power switch is turned off, then on again, wait at least
10 seconds to turn it on after turning it off. If there is no wait period between turning the main power
switch off, then on again, the machine may not function properly.
5 Click [OK].
3 User Operations
3 Touch [OK].
4 Press the Access key or touch [Login]. If a document is stored in the ID & Print User Box, select the
target logon method and then press the Access key or touch [Login].
6 Enter the Account Name and the Password from the keyboard.
7 Touch [OK].
4 Click the Registered User radio button and enter the User Name and User Password.
% When [External Server Authentication] (Active Directory) is set for the Authentication Method, select
the external authentication server from the pull-down menu of the server name.
5 Click [Login].
% If a wrong User Password or Account Password is entered, a message that tells that the authenti-
cation has failed appears. Enter the correct User Password or Account Password.
% If the Enhanced Security Mode is set to [ON], the entry of a wrong User/Account Password is count-
ed as unauthorized access. If a wrong User/Account Password for the corresponding User/Account
Name entered is entered a predetermined number of times (once to three times) or more set by the
administrator, a message appears that tells that authentication has not been successful for any sub-
sequent operation for authentication. The machine is then set into an access lock state, rejecting
any more logon attempts.
To cancel the access lock state, the administrator must perform the Release Setting. Contact the
administrator.
1 Log on to the user operation mode through user authentication from the control panel.
% To delete ID & Print document, select the specific document and touch [Delete].
5 To delete the document from the Box after the printing, select [Yes]. To leave the document as is, select
[No].
1 Log on to the user operation mode through User Authentication from the control panel.
2 Touch [Utility].
6 Touch [OK].
% If a wrong User Password is entered, a message that tells that the User Password does not match
appears. Enter the correct User Password.
% If the Enhanced Security Mode is set to [ON], the entry of a wrong User Password is counted as
unauthorized access. If the current password is mistakenly entered a predetermined number of
times (once to three times) or more set by the administrator, the user authentication screen will re-
appear. A message then appears that tells that authentication has not been successful for any sub-
sequent operation for authentication. The machine is now set into an access lock state, rejecting
any more logon attempts.
To cancel the access lock state, the administrator must perform the Release Setting. Contact the
administrator.
8 Touch [OK].
% If the entered User Password does not meet the Password Rules, a message that tells that the en-
tered User Password cannot be used appears. Enter the correct User Password. For details of the
Password Rules, see page 1-13.
% If the entered User Password does not match, a message that tells that the User Password does
not match appears. Enter the correct User Password.
1 Log on to the user operation mode through User Authentication from the Web Connection.
2 Click [Change Password] on the upper right of the Web Connection screen.
3 Enter the currently registered User Password and a new User Password. Then, to make sure that you
have entered the correct new password, enter the new User Password once again.
4 Click [OK].
% If a wrong User Password is entered in the "Current Password" box, a message that tells that the
User Password does not match appears. Enter the correct User Password.
% If the entered User Password in the "New Password" box does not meet the Password Rules, a
message that tells that the entered User Password cannot be used appears. Enter the correct User
Password. For details of the Password Rules, see page 1-13.
% If the entered User Password in the "New Password" box and "Retype New Password" box does
not match, a message that tells that the User Password does not match appears. Enter the correct
User Password.
5 Click [OK].
1 Log on to the user operation mode through User Authentication from the control panel.
% For the Secure Print ID, enter the one that has been set on the printer driver side.
% Touch [C] to clear the value entered last.
% Touch [Delete] to delete the last character entered.
% Touch [Shift] to show the upper case/symbol screen.
% Touch [Cancel] to go back to the previous screen.
5 Touch [OK].
% If a wrong Secure Print ID is entered, the desired Secure Print document will not be displayed. Enter
the correct Secure Print ID.
6 Select the desired Secure Print document and touch [Other] - [Enter Password].
% Two or more Secure Print Documents can be selected at the same time.
% Touching [Select All] will select all Secure Print Documents having the same ID shown in the list.
8 Touch [OK].
% If a wrong Secure Print Password is entered, a message that tells that the authentication has failed
appears. Enter the correct Secure Print Password.
% If two or more Secure Print documents have been selected in step 7, the machine counts as unau-
thorized access any Secure Print document, the Secure Print Password of which is a mismatch.
% If the Enhanced Security Mode is set to [ON], entry of a wrong Secure Print Password is counted as
unauthorized access. If a wrong Secure Print Password is entered a predetermined number of times
(once to three times) or more set by the administrator, a message appears that tells that authenti-
cation has not been successful for any subsequent operation for authentication. The machine is
then set into an access lock state, disabling access to the Secure Print document.
To cancel the access lock state, the administrator must perform the Release Setting. Contact the
administrator.
9 Touch [Print].
10 Check the details of the document and press the Start key.
% If two or more Secure Print documents, each having an identical Secure Print ID and Secure Print
Password, have been saved, multiple Secure Print documents can be printed at once.
Tips
- If a document is saved in the Copy mode, Fax/Scan mode, or User Box mode selected from the control
panel, by specifying a User Box number that has not been registered, a Personal User Box owned by
the user who logged on through User Authentication or a Group User Box owned by the account to
which the user who logged on through User Authentication belongs is automatically created. No Public
User Boxes are automatically created.
- When a document is saved in a box with a box number yet to be registered specified from the PC, the
Personal User Box owned by the user who logged on through User Authentication is automatically reg-
istered.
- If Account Track has not been enabled, Group User Box cannot be created.
1 Log on to the user operation mode through User Authentication from the control panel.
2 Touch [Utility].
% When [Personal] is selected, [Change Owner] is displayed. Then, select the desired owner name.
The default value of [Owner Name] is the user who has currently logged on to the function.
% When [Group] is selected, [Change Account Name] is displayed. Then, select the desired account
name. The default value of [Account Name] is the account to which the user who has currently
logged on to the function belongs.
9 Touch [OK].
% If the User Box Type is set to [Public], set a User Box Password that meets the Password Rules. For
details of the Password Rules, see page 1-13.
% If the entered User Box Password does not match, a message that tells that the User Box Password
does not match appears. Enter the correct User Box Passwords.
11 Touch [OK].
1 Log on to the user operation mode through User Authentication from the Web Connection.
3 Click [User Box List] from the menu and [New Registration].
% Be sure to enter the User Box Number, User Box Name, User Box Password, and Retype User Box
Password.
% A User Box Number that already exists cannot be redundantly registered.
% If [Personal] is selected from the User Box Type pull-down menu, click [User List] and select the user
from the registered user list. Or, directly enter in the "Owner Name" box the previously registered
User Name.
% If [Group] is selected from the User Box Type pull-down menu, click [Account List] and select the
account from the registered account list. Or, directly enter in the "Account Name" box the previously
registered Account Name.
6 Check the message that tells that the setting has been completed. Then, click [OK].
1 Call the User Box screen to the display from the control panel.
3 Enter the currently set User Box Password from the keyboard.
4 Touch [OK].
% If a wrong User Box Password is entered, a message that tells that the authentication has failed ap-
pears. Enter the correct User Box Password.
% If the Enhanced Security Mode is set to [ON], entry of a wrong User Box Password is counted as
unauthorized access. If a wrong User Box Password is entered a predetermined number of times
(once to three times) or more set by the administrator, the screen of step 2 reappears and the ma-
chine is set into an access lock state.
To cancel the access lock state, the administrator must perform the Release Setting. Contact the
administrator.
% To change the User Box Type, perform steps 5 through 8.
% To change the owner user or owner account, perform steps 6 through 8.
% To change the User Box Password, go to step 9.
% [Change Owner] appears if the Box Type is changed to [Personal]. Select the desired owner name.
% [Change Account Name] appears if the Box Type is changed to [Group]. Select the desired account
name.
% If the User Box Type is changed to [Public], set a User Box Password that meets the Password
Rules. For details of the Password Rules, see page 1-13.
6 Touch [Change Owner] if the box type is [Personal] and touch [Change Account Name] if the box type
is [Group].
8 Touch [OK].
9 Touch [Password].
10 Enter the currently set User Box Password from the keyboard.
11 Touch [OK].
% If a wrong User Box Password is entered, a message that tells that the User Box Password does
not match appears. Enter the correct User Box Password.
% If the Enhanced Security Mode is set to [ON], entry of a wrong User Box Password is counted as
unauthorized access. If a wrong User Box Password is entered a predetermined number of times
(once to three times) or more set by the administrator, the screen of step 2 reappears and the ma-
chine is set into an access lock state.
To cancel the access lock state, the administrator must perform the Release Setting. Contact the
administrator.
13 Touch [OK].
% If the User Box Type is changed to [Public], set a User Box Password that meets the Password
Rules. For details of the Password Rules, see page 1-13.
% If the entered User Box Password does not match, a message that tells that the User Box Password
does not match appears. Enter the correct User Box Password.
14 Touch [OK].
1 Log on to the user operation mode through User Authentication from the Web Connection.
% If a wrong User Box Password is entered, a message that tells that the authentication has failed ap-
pears. Enter the correct User Box Password.
% If the Enhanced Security Mode is set to [ON], entry of a wrong User Box Password is counted as
unauthorized access. If a wrong User Box Password is entered a predetermined number of times
(once to three times) or more set by the administrator, a message appears that tells that authenti-
cation has not been successful for any subsequent operation for authentication. The machine is
then set into an access lock state.
To cancel the access lock state, the administrator must perform the Release Setting. Contact the
administrator.
% Go to step 7 to change the User Box Password.
% To delete a User Box, click [Delete User Box]. A confirmation message appears. Click [OK] to delete
the specified User Box.
6 Click the "User Box Owner is changed." check box and change Type and Owner Name (or Account
Name).
7 Click the "User Box Password is changed." check box and enter the User Box Password.
% In the "Current Password" box, enter the currently set User Box Password.
8 Click [OK].
% If a wrong current User Box Password is entered, a message that tells that the User Box Password
does not match appears. Enter the correct User Box Password.
% If the User Box Type is changed to [Public], set a User Box Password that meets the Password
Rules. For details of the Password Rules, see page 1-13.
% If the entered User Box Password does not match, a message that tells that the User Box Password
does not match appears. Enter the correct User Box Password.
% If no Owner Name is entered, a message appears that tells that no Owner Names have been en-
tered. Enter the correct Owner Name.
% If a user name not registered with the machine is entered in the "Owner Name" box, a message ap-
pears that tells that the Owner Name entered in the box is illegal. Enter the correct Owner Name.
% If no Account Name is entered, a message appears that tells that no Account Names have been en-
tered. Enter the correct Account Name.
% If an account name not registered with the machine is entered in the "Account Name" box, a mes-
sage appears that tells that the Account Name entered in the box is illegal. Enter the correct Account
Name.
9 Click [OK].
1 Log on to the user operation mode through User Authentication from the control panel.
5 Touch [OK].
% If a wrong User Box Password is entered, a message that tells that the authentication has failed ap-
pears. Enter the correct User Box Password.
% If the Enhanced Security Mode is set to [ON], entry of a wrong User Box Password is counted as
unauthorized access. If a wrong User Box Password is entered a predetermined number of times
(once to three times) or more set by the administrator, a message appears that tells that authenti-
cation has not been successful for any subsequent operation for authentication. The machine is
then set into an access lock state, rejecting any more logon attempts.
To cancel the access lock state, the administrator must perform the Release Setting. Contact the
administrator.
1 Log on to the user operation mode through User Authentication from the Web Connection.
3 Enter the User Box Number and User Box Password of the desired User Box or select the target box
from [Select User Box] and input the box password.
4 Click [OK].
% If a wrong User Box Password is entered, a message that tells that the authentication has failed ap-
pears. Enter the User Box Password.
% If the Enhanced Security Mode is set to [ON], entry of a wrong User Box Password is counted as
unauthorized access. If a wrong User Box Password is entered a predetermined number of times
(once to three times) or more set by the administrator, a message appears that tells that authenti-
cation has not been successful for any subsequent operation for authentication. The machine is
then set into an access lock state, rejecting any more logon attempts.
To cancel the access lock state, the administrator must perform the Release Setting. Contact the
administrator.
1 Log on to the user operation mode through User Authentication from the Web Connection.
5 Enter the User Box Number of the desired User Box or select the target box from [Search from List].
7 Click [OK].
4 Application Software
Tips
- The time-of-day and date on which this machine was registered in the Data Administrator may be
changed. For details, see the Data Administrator User's Guide.
- The destination and authentication data read from this machine may be written as a backup file and can
be restored. For details, see the Data Administrator User's Guide.
- Destination setting can be made from the Data Administrator. For details, see the Data Administrator
User's Guide.
2 Select this machine from Device List and click [Authentication Settings/Address Settings] or [Adminis-
trator settings].
4 Type the Administrator Password registered in the machine and click [OK].
% If the "Save" check box has been selected, the Administrator Password entered is stored in the PC
being used. If you do not want the Administrator Password stored, clear the "Save" check box.
% If a wrong Administrator Password is entered, a message appears that tells that there is a mismatch
in the passwords. Enter the correct Administrator Password.
% If the "Save" check box is selected, enter the Administrator Password once again to make sure that
the Administrator Password has been entered correctly.
5 Check the data displayed on the SSL certificate check screen and click [Yes].
1 Access the machine through [Authentication Settings/Address Settings] mode of Data Administrator.
4 From the pull-down menu of User authentication, select the user authentication method.
% To change the user authentication method from "Device authentication" to "Network server authen-
tication," it is necessary first to register the domain name of Active Directory on the machine side.
% If "Network server authentication" is selected, "Active Directory" must invariably be selected.
1 Access the machine through [Authentication Settings/Address Settings] mode of Data Administrator.
3 From [Edit] on the tool bar, select [Authentication] and click [Change authentication mode].
4 Click [Next].
% Changing the Account Track setting erases all user and account information data that has previous-
ly been registered. At this time, Personal User Boxes owned by the users who are deleted and
Group User Boxes owned by the accounts that are deleted may be deleted or changed to Public
User Boxes.
If the boxes are changed to Public User Boxes and if the password set for a particular box before
this change does not meet the Password Rules, no access can be made to the Public User Box, to
which that specific box was changed. In this case, the administrator must first newly set a password
that meets the Password Rules. For details of the Password Rules, see page 1-13.
% If you have already logged on to the Administrator Mode via the control panel or using Web Con-
nection, the machine displays a message that tells that the write operation has not been successful
because of a device lock error. Click [OK] and wait for some while before attempting to execute [Ex-
port to the device] again.
% If there is a job being executed or a reserved job (timer TX, fax redial waiting, etc.) in the machine,
the machine displays a message that tells that the write operation has not been successful because
of a device lock error. Click [OK] and wait for some while before attempting to execute [Export to
the device] again.
7 Click [Finished].
1 Access the machine through [Authentication Settings/Address Settings] mode of Data Administrator.
2 Click the Authentication settings expand button of the function selection tree.
% If the boxes are changed to Public User Boxes and if the password set for a particular box before
this change does not meet the Password Rules, no access can be made to the Public User Box, to
which that specific box was changed. In this case, the administrator must first newly set a password
that meets the Password Rules. For details of the Password Rules, see page 1-13.
% If the User Password does not meet the Password Rules, a message that tells that the entered User
Password cannot be used appears. Enter the correct User Password. For details of the Password
Rules, see page 1-13.
% If the User Name has not been entered, a message appears that tells that the User Name is yet to
be entered. Click [OK] and enter the User Name.
% A User Name that already exists cannot be redundantly registered.
5 Click [OK].
1 Access the machine through [Authentication Settings/Address Settings] mode of Data Administrator.
2 Click the Authentication settings expand button of the function selection tree.
% If the boxes are changed to Public User Boxes and if the password set for a particular box before
this change does not meet the Password Rules, no access can be made to the Public User Box, to
which that specific box was changed. In this case, the administrator must first newly set a password
that meets the Password Rules. For details of the Password Rules, see page 1-13.
% If the Account Password does not meet the Password Rules, a message that tells that the entered
Account Password cannot be used appears. Enter the correct Account Password. For details of the
Password Rules, see page 1-13.
% If the Account Name has not been entered, a message appears that tells that the Account Name is
yet to be entered. Click [OK] and enter the Account Name.
% An Account Name that already exists cannot be redundantly registered.
5 Click [OK].
4 Click [DNS].
A92E-9640B-00 © 2017