Xerox VersaLink B7035 Güvenlik Fonksiyonu Ek Kılavuzu - Sayfa 29

Yazıcı Aksesuarları Xerox VersaLink B7035 için çevrimiçi göz atın veya pdf Güvenlik Fonksiyonu Ek Kılavuzu indirin. Xerox VersaLink B7035 50 sayfaları. Drum cartridge
Ayrıca Xerox VersaLink B7035 için: Hızlı Kullanım Kılavuzu (20 sayfalar), Manuel (6 sayfalar), Bakım (5 sayfalar), Hızlı Başlangıç Kılavuzu (2 sayfalar), Hızlı Kullanım Kılavuzu (20 sayfalar), Hızlı Kullanım Kılavuzu (20 sayfalar)

Xerox VersaLink B7035 Güvenlik Fonksiyonu Ek Kılavuzu
The following shows the types of roles.
System Administrator
System Administrator is assigned to the system administrator account by default.
The System Administrator role cannot be customized.
Basic User
Basic User is automatically assigned to a user with no device user role assigned, and Basic
Printing User is automatically assigned to a user with no printing user role assigned.
Features other than setup and configuration are allowed by default.
You can customize the basic user permissions.

Login Method

Local Authentication (Login to Local Accounts)
Local authentication uses the user information that is registered on the machine to manage
authentication.
Remote Authentication (Login to Network Accounts)
Remote authentication uses a network authentication server (LDAP or Kerberos Server) and
authenticates users based on the user information managed on the server. User information
cannot be registered on the machine.

Functions Controlled by Access Method

The following explains the functions that are restricted by the Authentication feature. The
restriction depends on which access method is used:
Local Access (Control Panel Permissions)
Remote Access (Device Website Permissions)
Local Access (Control Panel Permissions)
Direct operation of the machine from the control panel is called Local Access. The functions
restricted by Local Access are as follows.
Everything Except Setup
Users can access everything except setup and configuration functions.
Xerox
®
VersaLink
®
B7025/B7030/B7035 Multifunction Printer
Security Function Supplementary Guide
29