Xerox WORKCENTRE 7435 Ergänzendes Handbuch - Seite 25

Blättern Sie online oder laden Sie pdf Ergänzendes Handbuch für Drucker Xerox WORKCENTRE 7435 herunter. Xerox WORKCENTRE 7435 49 Seiten. Security function
Auch für Xerox WORKCENTRE 7435: Referenzhandbuch (28 seiten), Broschüre & Specs (8 seiten), Spezifikationen (15 seiten), Handbuch für Auswerter (32 seiten), Spezifikationen (14 seiten), Software-Upgrade (2 seiten), Schnellstart-Handbuch (7 seiten)

Xerox WORKCENTRE 7435 Ergänzendes Handbuch

Authentication for Folder

The following explains the restrictions for job flow sheets and Folder when the Authentication feature is enabled.
NOTE: When a user account is deleted, the Folder and job flow sheets associated with the account are also
deleted. Any files stored in the Folder will also be deleted.
NOTE: When the Authentication feature is used with a remote account server, the user information stored in
the machine may be temporarily deleted to restrict user access. When this happens, the Folder and job
flow sheets associated with the user will also be deleted. When using a remote authentication server to
manage authentication, use of Folder and job flow sheets in the System Administration mode is
recommended.
NOTE: For Folder and job flow sheets, Authenticated Users who are given the System Administrator privileges
have the same access level as Authenticated Users with no System Administrator privileges.

Types of Folder

The following three types of Folder can be used with the machine.

Machine Administrator Shared Folder

The Machine Administrator Shared Folder is a Folder created by a Machine Administrator.
When the Authentication feature is enabled, this Folder is shared by all Authenticated Users.

Only Machine Administrator can change the settings.

To create a Machine Administrator Shared Folder, operate the machine as a Machine Administrator.

Personal Folder

This is a Folder created by an Authenticated User using the Authentication feature.
Only the Authenticated User that created the Folder can use it.
The following explains the operations available. When the Authentication feature is not enabled
25