beautypg.com

Functions using the pki card authentication system – Konica Minolta bizhub 364e User Manual

Page 28

background image

How to Use the Authentication Unit

3

AU-211P

27

3.2

Functions Using the PKI Card Authentication
System

This section explains the functions using the PKI card authentication system.

Function

Description

See

Address Search
(LDAP) Using PKI
Card

Logs into the LDAP server using the Kerberos
authentication ticket that is obtained by Active
Directory authentication with the PKI card when
searching for the destination via the LDAP server.
The user can perform authentication only once to
obtain access privileges, and configure the single
sign-on environment to be convenient.

p. 29

SMB TX Using PKI
Card

Logs into the destination computer using the
Kerberos authentication ticket that is obtained by
Active Directory authentication with the PKI card
when sending scanned data via SMB.
The user can perform authentication only once to
obtain access privileges, and configure the single
sign-on environment to be convenient.

p. 35

Scan to E-mail (S/
MIME) Using PKI
Card

Adds a digital signature using the PKI card when
sending an e-mail.
This function prevents fabrication or spoofing of
an e-mail.

p. 40

PDF Encryption and
Signature Addition
Using PKI Card

Encrypts a PDF document and adds a signature
using the digital certificate registered in the PKI
card when distributing scanned data as a PDF
document.
This function prevents illegal access to or
fabrication of a PDF document.
The optional Upgrade Kit UK-204 and i-Option
LK-102 v3 are required to encrypt a PDF
document using the PKI card.

p. 44

PKI Card Print

The user can encrypt print data using the PKI card
before sending the data to the MFP. Print data is
stored on an MFP, and can be decrypted and
printed if the same user performs authentication
on a MFP using the PKI card.
The print data is encrypted when it is sent from the
printer driver and can only be printed when
authentication at the MFP using the PKI card is
successful; therefore, you can ensure the
confidentiality of documents.

p. 47