
Contents
Preface .................................................................................................................................................................... 2
About This Manual .................................................................................................................................................... 3
Trademarks .............................................................................................................................................................. 7
Copyright .................................................................................................................................................................. 8
Disclaimers ............................................................................................................................................................... 9
Introduction .................................................................................................................................................... 11
Main Functions ....................................................................................................................................................... 12
User Authentication Methods and Managed Users ................................................................................................... 17
Structure of Usage Restrictions ............................................................................................................................... 19
Regarding Base Roles and Custom Roles .................................................................................................................. 20
Device Management Privileges ................................................................................................................................ 23
Device Function Restrictions .................................................................................................................................... 26
Access Management System Congurations ............................................................................................................ 34
Administrators for the Access Management System ................................................................................................. 35
System Requirements ............................................................................................................................................. 37
Setting Up the Access Management System ........................................................................ 39
Flow of Settings for Operating with Local Device Authentication .............................................................................. 40
Flow of Settings for Operating with Server Authentication ....................................................................................... 42
Preparing the Device and Network Environment ...................................................................................................... 44
Logging in to User Authentication ........................................................................................................................... 47
Specifying the Preferences of the Devices ................................................................................................................ 48
Specifying the Device Preferences Using User Authentication ................................................................................... 49
Managing Roles ...................................................................................................................................................... 62
Managing Roles Using User Authentication ............................................................................................................ 63
Setting Up the Client Computers ................................................................................................... 75
Flow of Setting Up Client Computers ........................................................................................................................ 76
Operation Example of Local Device Authentication ...................................................... 78
Example of Operating with Local Device Authentication ........................................................................................... 79
Flow of Operations .................................................................................................................................................. 81
Preparing the Device and Network Environment ...................................................................................................... 83
Specifying the Preferences of the Devices ................................................................................................................ 84
Creating Custom Roles ............................................................................................................................................ 93
Exporting Custom Roles .......................................................................................................................................... 97
Registering Local Users and Specifying Roles ........................................................................................................... 98
Exporting User Information ................................................................................................................................... 102
Importing Roles and User Information ................................................................................................................... 103
I