Documente Academic
Documente Profesional
Documente Cultură
Security Operations
2014. 8
Ver. 1.05
Contents
1 Security
1.1 Introduction ..................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ......................................................................................... 1-2
Operating Precautions ....................................................................................................................... 1-2
INSTALLATION CHECKLIST.............................................................................................................. 1-3
1.2 Security Functions .......................................................................................................................... 1-4
Check Count Clear Conditions .......................................................................................................... 1-4
1.3 Data to be Protected ...................................................................................................................... 1-5
1.4 Precautions for Operation Control ................................................................................................ 1-6
Roles and Requirements of the Administrator ................................................................................... 1-6
Password Usage Requirements ........................................................................................................ 1-6
Network Connection Requirements for the Machine......................................................................... 1-6
User information control system control requirements ..................................................................... 1-7
Security function operation setting operating requirements.............................................................. 1-7
Operation and control of the machine ............................................................................................... 1-7
Machine Maintenance Control ........................................................................................................... 1-7
Operating conditions for the IC card and IC card reader .................................................................. 1-7
IC card owner requirements .............................................................................................................. 1-8
1.5 Miscellaneous.................................................................................................................................. 1-9
Password Rules ................................................................................................................................. 1-9
Precautions for Use of Various Types of Applications....................................................................... 1-9
Encrypting communications ............................................................................................................ 1-10
IPP printing ...................................................................................................................................... 1-10
Items of Data Cleared by Data Erase Function................................................................................ 1-11
HDD Format ..................................................................................................................................... 1-12
Upgrading of the firmware ............................................................................................................... 1-12
Software used in the machine ......................................................................................................... 1-12
2 Administrator Operations
2.1 Accessing the Administrator Settings .......................................................................................... 2-2
Accessing the Administrator Settings................................................................................................ 2-2
2.2 Enhancing the Security Function................................................................................................... 2-5
Setting the Enhanced Security Mode ................................................................................................ 2-7
2.3 Setting the Authentication Method ............................................................................................... 2-9
Setting the Authentication Method .................................................................................................... 2-9
2.4 ID & Print Setting Function........................................................................................................... 2-11
Setting the ID & Print........................................................................................................................ 2-11
2.5 System Auto Reset Function ....................................................................................................... 2-12
Setting the System Auto Reset function .......................................................................................... 2-12
2.6 User Setting Function ................................................................................................................... 2-14
Making user setting.......................................................................................................................... 2-14
2.7 IC card information Setting Function.......................................................................................... 2-16
Registering information from the control panel ............................................................................... 2-16
2.8 Changing the Administrator Password....................................................................................... 2-18
Changing the Administrator Password ............................................................................................ 2-18
2.9 Protecting Data in the HDD.......................................................................................................... 2-21
2.9.1 Setting the Encryption Key (encryption word) ................................................................................. 2-21
2.9.2 Deleting the encryption key ............................................................................................................. 2-24
2.10 Erasing data when the machine is to be discarded or use of a leased machine is
terminated...................................................................................................................................... 2-25
2.10.1 Setting the Overwrite All Data.......................................................................................................... 2-25
2.10.2 Setting the Restore All ..................................................................................................................... 2-28
2.11 SSL Setting Function .................................................................................................................... 2-30
2.11.1 Device Certificate Setting ................................................................................................................ 2-30
3 User Operations
3.1 User Authentication Function ........................................................................................................ 3-2
3.1.1 Performing user authentication (authentication through entry of the user name and
user password)....................................................................................................................................3-3
3.1.2 Performing user authentication (identification through the IC card) .................................................. 3-6
3.1.3 Performing user authentication (authentication through the IC card + user password) .................... 3-7
3.2 ID & Print Function ........................................................................................................................ 3-11
3.2.1 Registering ID & Print files ............................................................................................................... 3-11
3.2.2 Accessing the ID & Print file............................................................................................................. 3-13
3.3 Change Password Function ......................................................................................................... 3-15
Performing Change Password ......................................................................................................... 3-15
3.4 Secured Job Function................................................................................................................... 3-16
3.4.1 Registering Secured Job files .......................................................................................................... 3-16
3.4.2 Accessing the Secured Job file ....................................................................................................... 3-18
3.5 Scan to HDD Function .................................................................................................................. 3-21
3.5.1 Registering image files..................................................................................................................... 3-21
3.5.2 Accessing the image file .................................................................................................................. 3-23
3.6 S/MIME transmission function .................................................................................................... 3-25
Sending E-mail by S/MIME .............................................................................................................. 3-25
4 Application Software
4.1 PageScope Data Administrator ..................................................................................................... 4-2
Precautions during backup or restore ............................................................................................... 4-2
4.1.1 Accessing from PageScope Data Administrator ............................................................................... 4-2
4.1.2 Setting the user authentication method............................................................................................. 4-4
4.1.3 Changing the authentication mode.................................................................................................... 4-6
4.1.4 Making the user settings.................................................................................................................... 4-9
4.1.5 Setting the IC card information........................................................................................................ 4-10
4.1.6 Registering the S/MIME certificate .................................................................................................. 4-12
4.2 TWAIN driver.................................................................................................................................. 4-14
Accessing from the TWAIN driver.................................................................................................... 4-14
1 Security
1.1 Introduction
Thank you for purchasing our product.
This User's Guide contains the operating procedures and precautions to be used when using the security
functions offered by the bizhub C3850/C3350 machine. To ensure the best possible performance and effec-
tive use of the machine, read this manual thoroughly before using the security functions. The Administrator
of the machine should keep this manual for ready reference. The manual should be of great help in finding
solutions to operating problems and questions.
This User's Guide (Ver. 1.05) covers the following.
Operating Precautions
The machine gives an alarm message or an alarm sound (peep) when a wrong operation is performed or a
wrong entry is made during operation of the machine. (No "peep" alarm sound is issued if a specific sound
setting in Sound Setting of Accessibility Setting is set to [OFF].) If the alarm message or alarm sound is given,
perform the correct operation or make the correct entry according to the instructions given by the message
or other means.
The Administrator of the machine should not leave the machine with the setting screen left displayed after
the access to that mode is completed or in the middle of the mode. If it is absolutely necessary to leave the
machine, the Administrator of the machine should log off from the mode.
The Administrator of the machine should make sure that each individual general user logs off from the current
mode whenever the access to that mode is completed or if the user leaves the machine in the middle of the
mode with the mode screen left displayed.
NOTICE
This machine permits duplicate login operations performed by the service engineer, the Administrator of the
machine, and the user.
- The Administrator of the machine should make sure that, when the service engineer changes the set-
tings, neither the Administrator of the machine nor the user performs the login operation.
- The Administrator of the machine should make sure that no user is allowed to perform the login oper-
ation when the Administrator of the machine changes or deletes user information or user data.
- To prevent settings of the machine from being duplicated, the Administrator of the machine should not
attempt to change the settings in a condition of having logged onto a mode simultaneously from the
control panel and the client PC.
The administrator of the machine disables the following functions and operates and manages the machine
under a condition in which those functions are disabled.
Password Rules
According to certain Password Rules, registration of a password consisting of a string of a single character
or change of a password to one consisting of a string of a single character is rejected for the Administrator
Password, User Password, Secured Job Password, and SNMP Password. For the Administrator Password,
User Password, and SNMP Password, the same password as that currently set is not accepted.
Study the following table for more details of the number of digits and characters that can be used for each
password.
NOTICE
Before setting the Enhanced Security Mode, be sure to enable the Password Rules. The Password Rules can
be turned on by selecting [ON] for [Password Rules] that can be accessed from the control panel as follows:
[Utility] ö [Administrator Settings] ö [ ] ö [Security Settings] ö [Security Details].
Use the following browsers to ensure SSL encryption communication with appropriate strength. Use of any
of the following browsers achieves SSL encryption communication that ensures confidentiality of the image
data transmitted and received.
For Windows
- Microsoft Internet Explorer 8 or later
- Mozilla Firefox 18 or later
For Mac OS
- Mozilla Firefox 18 or later
On Linux
- Mozilla Firefox 18 or later
IPP printing
IPP (Internet Printing Protocol) is a function that allows Secured Job and image data stored in HDD to be
printed via the Internet by using the HTTP (HyperText Transfer Protocol) of the TCP/IP Protocol. IPPS (IPP
over SSL/TLS) is the type of IPP that performs the SSL encryption communication.
<Installing printer driver>
To perform IPP printing, the printer driver must be installed. From "Add Printer Wizard", type the IP address
of this machine in the following format in the "URL" field.
To set IPP printing:
- Type "http://<IP address of the machine>/ipp"
To set IPPS printing:
<In Windows XP/Server 2003>
- Type "https://<IP address of the machine>/ipp"
<In Windows Vista/7/Server 2008/Server 2008 R2/Server 2012>
- Type "https://[host name].[domain name]/ipp"
For [Host Name] and [Domain Name], specify the names set with the DNS server.
2 Click "Certificate Error" to display the certificate. Then, click "Install Certificate" to install the certificate.
3 Display the physical stores. Then, deploy the certificate, which has earlier been exported, in "Local
Computer" of "Trusted Root Certification Authorities" to thereby import the certificate.
2 Administrator Operations
1 Touch [Utility].
4 Touch [OK].
% If a wrong Administrator Password is entered, a message that tells that the Administrator Password
does not match appears. Enter the correct Administrator Password.
% A failure in authentication as a result of the entry of a wrong password is counted as unauthorized
access. If the cumulative number of unauthorized accesses reaches three during operation of the
machine, the machine is set into an access lock state and prohibits any subsequent password entry
operations. To cancel the access lock state, turn off, then on, the power switch of the machine.
When the power switch is turned off, then on again, wait at least 10 seconds to turn it on after turn-
ing it off. This interval is necessary to ensure that the machine functions properly.
5 Press the [Reset] key to log off from the Administrator Settings.
% When accessing the Administrator Mode using the PageScope Web Connection, enter the same
Administrator Password as that for the machine.
6 Click [OK].
% If a wrong Administrator Password is entered, a message that tells that the authentication has failed
appears. Enter the correct Administrator Password.
% A failure in authentication as a result of the entry of a wrong password is counted as unauthorized
access. If the cumulative number of unauthorized accesses reaches three during operation of the
machine, the machine is set into an access lock state and prohibits any subsequent password entry
operations. To cancel the access lock state, turn off, then on, the power switch of the machine.
When the power switch is turned off, then on again, wait at least 10 seconds to turn it on after turn-
ing it off. This interval is necessary to ensure that the machine functions properly.
7 Click [Log out]. This allows you to log off from the Administrator Mode.
Setting the Enhanced Security Mode to [ON] changes the setting values of the following functions.
Function Name Factory Setting When Enhanced Security Mode is set to [ON]
Public Access Restrict Restrict (not to be changed)
Print without Authentica- Restrict Restrict (not to be changed)
tion
User Name List OFF OFF (not to be changed)
Registering and Chang- Allow Restrict (to be changed)
ing Address by the user
SSL OFF ON (not to be changed)
SSL Encryption Strength AES-256, 3DES, AES-256, 3DES (not to be changed to one containing
RC4-128, strength lower than AES/3DES)
DES, RC4-40
S/MIME S/MIME: Dis- S/MIME: Enable (not to be changed)
able Digital Signature: Select when sending
Digital Signa- E-mail Text Encryption Method: 3DES, AES-128, AES-
ture: Do not add 192, AES-256 (not to be changed to DES or RC-2)
signature
E-mail Text En-
cryption Meth-
od: 3DES
FTP Server Enable Disable
(Selection can be made between [Enable] and [Disable])
SNMPv1/v2c Read/Write en- Only Read is enabled (not to be changed)
abled
SNMP v3 Security Level auth-password/ auth-password/priv-password
and auth-password/priv- priv-password (Selection can be made between [auth-password] and
password [auth-password/priv-password])
(SNMP v3 Write User)
Administrator Password Enabled Restrict
Change Via Network
(Pagescope Web Con-
nection)
Network firmware update Invalid Valid
protect
CS Remote Care Usable Remote device setting disabled
Telnet Enable Disable (not to be changed)
1 Call the Administrator Settings on the display from the control panel.
2 Touch [ ].
5 Select [ON] to enable the Enhanced Security Mode and touch [OK].
Touch [OK], then the machine restarts automatically.
3 Select [Device] or [External Server] from the User Authentication pull-down menu, and click [Apply].
If [Device] is selected, perform steps 4 through 5.
If [External Server] is selected, perform steps 6 through 10.
4 If [Device] is selected, click [General Settings] from the [Authentication Device Settings] menu and set
[Authentication Type].
5 Click [Apply].
6 If [External Server] is selected, click [External Server List] from [Authentication] menu.
7 Click [Edit].
10 Click [Apply].
% If [Enable] is set, the document is stored as ID & Print file even if [Print] is selected on the printer
driver side.
% Even if [Disable] is set, the document is stored as ID & Print file if [ID & Print] is selected on the printer
driver side.
4 Click [Apply].
1 Call the Administrator Settings on the display from the control panel.
3 Touch [ ].
7 Select [ON], and enter the period of time (1 min. to 9 min.) after which system auto reset is activated
using [-]/[+] key.
% If no operations are performed for 1 min. even with system auto reset set to [OFF], the function is
activated to cause the user to log off from the mode automatically.
% The time for system auto reset can be set to a value between 1 min. and 9 min., variable in 1-min.
increments.
8 Touch [OK].
% To change a User Password, click [Edit] and select the "Change Password" check box. Then, enter
the new User Password.
5 Click [Apply].
% If the entered User Password does not meet the requirements of the Password Rules, a message
that tells that the entered User Password cannot be used appears. Enter the correct User Password.
For details of the Password Rules, see page 1-9.
6 Check the message that tells that the setting has been completed. Then, click [OK].
% To delete a previously registered user, click [Delete] in step 3. Check the contents of registration on
the confirmation screen and click [OK] if the user is to be deleted. If a user is deleted, the image files
owned by that specific user are deleted.
1 Call the Administrator Settings on the display from the control panel.
% Press [Display All Users] to display all users. Press the input area to extract target users with search
characters.
5 Touch [Edit].
% Touch [Edit] also if the IC card information which has previously been registered is to be modified
or a card ID has been registered through [Input the card ID directly] of PageScope Data Administra-
tor.
% To delete a previously registered IC card information, touch [Delete]. Touch [OK] on the confirmation
screen that will appear.
7 Touch [Close].
1 Call the Security Settings screen on the display from the control panel.
5 Touch [OK].
% If a wrong Administrator Password is entered, a message that tells that the Administrator Password
does not match appears. Enter the correct Administrator Password.
% A failure in authentication as a result of the entry of a wrong password is counted as unauthorized
access. If the cumulative number of unauthorized accesses reaches three during operation of the
machine, the machine is set into an access lock state and prohibits any subsequent password entry
operations. To cancel the access lock state, turn off, then on, the power switch of the machine.
When the power switch is turned off, then on again, wait at least 10 seconds to turn it on after turn-
ing it off. This interval is necessary to ensure that the machine functions properly.
7 Enter the new 8-digit Administrator Password from the keyboard, and touch [OK].
10 Touch [OK].
% If the entered Administrator Password does not meet the requirements of the Password Rules, a
message that tells that the entered Administrator Password cannot be used appears. Enter the cor-
rect Administrator Password. For details of the Password Rules, see page 1-9.
% If the entered Administrator Password does not match, [OK] cannot be touched. Enter the correct
Administrator Password.
Reference
- When an Encryption Key (encryption word) is set using HDD Encryption Setting, an Encryption Key with
a key length of 256 bits is generated. The generated encryption key is used to encrypt or decrypt data
through AES encryption algorithm.
1 Call the Security Settings screen on the display from the control panel.
% Changing the setting of HDD Encryption Setting (switching between ON and OFF) will format the
HDD. For details of items that are cleared by HDD Format, see page 1-11.
% If the entered Encryption Key does not meet the setting requirements, [OK] cannot be touched.
% Touch [C] to clear all characters.
% Touch [ ] to delete the last character entered.
% Touch [Shift] to show the upper case/symbol screen.
% Touch [Cancel] to go back to the previous screen.
8 Touch [OK].
The machine restarts automatically.
1 Call the HDD Encryption Setting screen on the display from the control panel.
% Changing the setting of HDD Encryption Setting (switching between ON and OFF) will format the
HDD. For details of items that are cleared by HDD Format, see page 1-11.
Mode Description
Mode 1 Overwrites once with "0x00".
Mode 2 Overwrites with "random numbers" ö "random numbers" ö "0x00".
Mode 3 Overwrites with "0x00" ö "0xff" ö "random numbers" ö verifies.
Mode 4 Overwrites with "random numbers" ö "0x00" ö "0xff".
Mode 5 Overwrites with "0x00" ö "0xff" ö "0x00" ö "0xff".
Mode 6 Overwrites with "0x00" ö "0xff" ö "0x00" ö "0xff" ö "0x00" ö "0xff" ö "random
numbers".
Mode 7 Overwrites with "0x00" ö "0xff" ö "0x00" ö "0xff" ö "0x00" ö "0xff" ö "0xaa".
Mode 8 Overwrites with "0x00" ö "0xff" ö "0x00" ö "0xff" ö "0x00" ö "0xff" ö "0xaa"
ö verifies.
0 For the procedure to call the Security Settings screen on the display, see steps 1 through 3 of page 2-7.
0 Do not leave the machine with the setting screen of Administrator Settings left shown on the display. If
it is absolutely necessary to leave the machine, be sure first to log off from the Administrator Settings.
0 For details of items that are cleared, see page 1-11.
1 Call the Security Settings screen on the display from the control panel.
6 Touch [OK].
% Do not turn off the power switch of the machine during execution of Overwrite All Data. If the power
switch is inadvertently turned off during the execution of Overwrite All Data and the machine, as a
result, fails to recognize the HDD or develops other fault, contact your Service Representative.
1 Call the Security Settings on the display from the control panel.
3 Touch [Initialize].
% Do not turn off the power switch of the machine during execution of Restore All. If the power switch
is inadvertently turned off during the execution of Restore All and the machine, as a result, develops
a fault, contact your Service Representative.
% Settings are all cleared if [Apply] is clicked with data entered for each item not meeting the require-
ments.
6 Click [Apply].
The certificate can now be registered.
2 Click the [Security] tab and [SSL/TLS Settings] from [PKI Settings] menu.
3 Click [Edit].
5 Click [OK].
% For encryption method, select the strong [3DES], [AES-128], [AES-192], or [AES-256]. If the mail
software being used does not support AES, encrypted mail messages may be received, but they
cannot be decrypted. Use AES-compliant mail software or select the encryption method that is the
strongest of all compliant with the currently used mail software.
% Each encryption method represents the following.
5 Click [Apply].
5 Click to select the [Edit a Certification] check box, and through [Browse], set the certification. If certifi-
cation is to be deleted, select [Delete a Certification].
% Set 1024 bits or more for the key length of the RSA public key for the certificate of each destination.
7 Click [Apply].
3 Click the [Change Password] check box and enter the auth-password and priv-password in the boxes
marked by the rectangle, that is, the Write side SNMP v3 Setting.
% The default setting of auth-password and priv-password is the MAC address set in the machine.
4 Click [Apply].
% If the entered auth-password or priv-password does not meet the requirements of the Password
Rules, a message that tells that the entered auth-password or priv-password cannot be used ap-
pears. Enter the correct auth-password or priv-password. For details of the Password Rules, see
page 1-9.
2 Click the [Storage] tab and click [View] of the User Name by which the desired document is stored.
% If [Delete] is selected, a confirmation message appears. Click [OK] to delete the specified file.
1 Call the Administrator Settings on the display from the control panel.
7 Touch [OK].
2 Click the [Network] tab and [IPv4 Settings] from [TCP/IP Settings] menu.
5 Click [Apply].
2 Click the [Network] tab and [DNS Settings] from [TCP/IP Settings] menu.
5 Click [Apply].
4 Click [Apply].
1 Call the Network Settings screen on the display from the control panel.
4 Touch [Close].
4 Click [Apply].
1 Call the Network Settings screen on the display from the control panel.
5 Touch [Close].
2 Click the [Network] tab and [E-mail TX (SMTP)] from [E-mail Settings] menu.
4 Click [Apply].
3 User Operations
If the IC card function has been set by the Administrator of the machine, authentication using the IC card can
be performed, in addition to that based on entry of a user name and a user password.
Reference
- If authentication is to be performed by using the IC card, the Administrator of the machine should set
the IC card function and information recorded on the IC card be registered in the machine in advance.
For more details, contact the Administrator of the machine.
- Authentication using the IC card is enabled only when [Device] is selected.
- Authentication using the IC card is disabled, if it is performed from a device other than this machine,
such as printing from PageScope Web Connection or printer driver.
% The screen as shown below appears if the ID & Print function has been set.
If the ID & Print function is yet to be set, [ID & Print/MFP Access] and [Access Basic Screen] are not
available on the screen even with an ID & Print file is saved in the machine.
In this case, log onto the machine through the ordinary procedure, select the desired file from [ID &
Print] and have it printed. For details of how to access the ID & Print file, see page 3-13.
3 Touch [OK].
6 Touch [OK].
7 Touch [Login].
% The screen as shown below appears if the ID & Print function has been set.
If the ID & Print function is yet to be set, [ID & Print/MFP Access] and [Access Basic Screen] are not
available on the screen even with an ID & Print file is saved in the machine.
In this case, log onto the machine through the ordinary procedure, select the desired file from [ID &
Print] and have it printed. For details of how to access the ID & Print file, see page 3-13.
2 Placing the IC card on the IC card reader allows you to log onto the machine.
If an ID & Print file has been saved, select [ID & Print/MFP Access] or [Access Basic Screen] and then
place the IC card on the IC card reader.
% The screen as shown below appears if the ID & Print function has been set.
If the ID & Print function is yet to be set, [ID & Print/MFP Access] and [Access Basic Screen] are not
available on the screen even with an ID & Print file is saved in the machine.
In this case, log onto the machine through the ordinary procedure, select the desired file from [ID &
Print] and have it printed. For details of how to access the ID & Print file, see page 3-13.
5 Touch [OK].
6 Touch [Login].
% If an ID & Print file has been saved, select [ID & Print/MFP Access] or [Access Basic Screen] and
then touch [Login].
4 Click the Registered User radio button and enter the User Name and User Password.
6 Click [Log out] to log off from the user operation mode.
% If the user password does not correspond to the user name entered, the ID & Print file is discarded
without being registered.
% If an attempt is made to print or save a file by specifying a user name that contains ["] (a double
quotation mark), a login error results and the machine cancels the print job.
% A failure in authentication as a result of the entry of a wrong password is counted as unauthorized
access. If the cumulative number of unauthorized accesses reaches three during operation of the
machine, the machine is set into an access lock state and prohibits any subsequent password entry
operations. To cancel the access lock state, turn off, then on, the power switch of the machine.
When the power switch is turned off, then on again, wait at least 10 seconds to turn it on after turn-
ing it off. This interval is necessary to ensure that the machine functions properly.
1 Log on to the user operation mode through User Authentication from the control panel.
% The ID & Print file is automatically deleted as soon as the printing is normally terminated.
1 Log on to the user operation mode through User Authentication from the PageScope Web Connection.
3 Enter the currently registered User Password and a new User Password. Then, to make sure that you
have entered the correct new password, enter the new User Password once again.
4 Click [Apply].
% If a wrong User Password is entered in the "Current Password" box, a message that tells that the
User Password does not match appears. Enter the correct User Password.
% If the entered User Password in the "New Password" box does not meet the requirements of the
Password Rules, a message that tells that the entered User Password cannot be used appears. En-
ter the correct User Password. For details of the Password Rules, see page 1-9.
% If the entered User Password in the "New Password" box and "Retype New Password" box does
not match, a message that tells that the User Password does not match appears. Enter the correct
User Password.
1 Click [Properties] in the Print dialog box to show the Printing Preference window.
5 Click [OK].
% If the user password does not correspond to the user name entered, the Secured Job file is discard-
ed without being registered.
% If an attempt is made to print or save a file by specifying a user name that contains ["] (a double
quotation mark), a login error results and the machine cancels the print job.
% A failure in authentication as a result of the entry of a wrong password is counted as unauthorized
access. If the cumulative number of unauthorized accesses reaches three during operation of the
machine, the machine is set into an access lock state and prohibits any subsequent password entry
operations. To cancel the access lock state, turn off, then on, the power switch of the machine.
When the power switch is turned off, then on again, wait at least 10 seconds to turn it on after turn-
ing it off. This interval is necessary to ensure that the machine functions properly.
1 Log on to the user operation mode through User Authentication from the control panel.
% The name of the user of the PC from which the Secured Job file has been sent appears.
% For the Secured Job Password, enter the 8-digit one set on the printer driver side.
% Touch [C] to clear all characters.
% Touch [ ] to delete the last character entered.
% Touch [Shift] to show the upper case/symbol screen.
% Touch [Cancel] to go back to the previous screen.
8 Touch [OK].
% If a wrong Secured Job Password is entered, a message that tells that the authentication has failed
appears. Enter the correct Secured Job Password.
% A failure in authentication as a result of the entry of a wrong password is counted as unauthorized
access. If the cumulative number of unauthorized accesses reaches three during operation of the
machine, the machine is set into an access lock state and prohibits any subsequent password entry
operations. To cancel the access lock state, turn off, then on, the power switch of the machine.
When the power switch is turned off, then on again, wait at least 10 seconds to turn it on after turn-
ing it off. This interval is necessary to ensure that the machine functions properly.
1 Log on to the user operation mode through User Authentication from the control panel.
% The image file stored in [Personal] is protected. Select [Personal] whenever saving a highly confi-
dential file.
1 Log on to the user operation mode through User Authentication from the control panel.
% To delete image file, select the specific document and press [Delete].
1 Log on to the user operation mode through User Authentication from the PageScope Web Connection.
2 Click the [Storage] tab and click [View] of the User Name by which the desired file is stored.
% If [Delete] is selected, a confirmation message appears. Click [OK] to delete the specified file.
1 Log on to the user operation mode through User Authentication from the control panel.
4 Touch [Application].
% To select [E-Mail Encryption], the administrator of the machine must make the S/MIME settings in
advance.
6 Touch [Close].
% To select the destination, the administrator of the machine must register the certificate with the des-
tination in advance.
4 Application Software
2 Select this machine from Device List and click [Authentication Settings/Address Settings].
4 Type the 8-digit Administrator Password registered in the machine and click [OK].
% If the "Save" check box has been selected, the Administrator Password entered is stored in the PC
being used. If you do not want the Administrator Password stored, clear the "Save" check box.
% If a wrong Administrator Password is entered, a message appears that tells that there is a mismatch
in the passwords. Enter the correct Administrator Password.
% If the "Save" check box is selected, enter the 8-digit Administrator Password once again to make
sure that the Administrator Password has been entered correctly.
% If a wrong Administrator Password is entered for confirmation, a message appears that tells that
there is a mismatch in the Administrator Password. Enter the correct Administrator Password.
% A failure in authentication as a result of the entry of a wrong password is counted as unauthorized
access. If the cumulative number of unauthorized accesses reaches three during operation of the
machine, the machine is set into an access lock state and prohibits any subsequent password entry
operations. To cancel the access lock state, turn off, then on, the power switch of the machine.
When the power switch is turned off, then on again, wait at least 10 seconds to turn it on after turn-
ing it off. This interval is necessary to ensure that the machine functions properly.
5 Check the data displayed on the SSL certificate check screen and click [Yes].
1 Access the machine through [Authentication Settings/Address Settings] mode of PageScope Data Ad-
ministrator.
% To change the user authentication method from "Device authentication" to "Network server authen-
tication," it is necessary first to register the domain name of Active Directory on the machine side.
% If "Network server authentication" is selected, "Active Directory" must invariably be selected.
1 Access the machine through [Authentication Settings/Address Settings] mode of PageScope Data Ad-
ministrator.
3 From [Edit] on the tool bar, select [Authentication] and click [Change authentication mode].
4 Click [Next].
% If there is a job being executed or a reserved job (timer TX, fax redial waiting, etc.) in the machine,
the machine displays a message that tells that the write operation has not been successful because
of a device lock error. Click [OK] and wait for some while before attempting to execute [Export to
the device] again.
7 Click [Finished].
1 Access the machine through [Authentication Settings/Address Settings] mode of PageScope Data Ad-
ministrator.
5 Click [OK].
1 Access the machine through [Authentication Settings/Address Settings] mode of PageScope Data Ad-
ministrator.
4 Click [OK].
5 Enter the user name and password, and select the [IC card authentication] tab.
7 Click [OK].
9 Click [Write].
10 Click [OK].
% If the user IC card information is registered through [Input the card ID directly], the user must be
associated with the card through the Administrator Settings of the machine. For more details, see
page 2-16.
1 Access the machine through [Authentication Settings/Address Settings] mode of PageScope Data Ad-
ministrator.
6 Click [Register] of S/MIME Certification file and select the certificate to be registered.
% Set 1024 bits or more for the key length of the RSA public key for the certificate of each destination.
8 Click [OK].
2 From the [File] menu, click [Read], and then select [KONICA MINOLTA C3850 Series TWAIN].
3 Select the "Login as the Registered user" radio button and enter the User Name and the 8-to-64-digit
User Password.
% If [External Server] (Active Directory) is set for the authentication method, enter the desired external
server.
4 Click [OK].
% If a wrong User Password is entered, a message that tells that the authentication has failed appears.
Enter the correct User Password.
% A failure in authentication as a result of the entry of a wrong password is counted as unauthorized
access. If the cumulative number of unauthorized accesses reaches three during operation of the
machine, the machine is set into an access lock state and prohibits any subsequent password entry
operations. To cancel the access lock state, turn off, then on, the power switch of the machine.
When the power switch is turned off, then on again, wait at least 10 seconds to turn it on after turn-
ing it off. This interval is necessary to ensure that the machine functions properly.
% If [External Server] (Active Directory) is set for the authentication method and if user authentication
is successful, the User Name not registered in the machine is automatically registered.
A3GN-9571B-00 © 2014