3 user operations, 1 user authentication function, 1 user authentication using the ic card – Konica Minolta BIZHUB C253 User Manual
Page 57: User operations, User authentication function -2, User authentication using the ic card -2, 3user operations
C253/C203
3-2
User Operations
3
3
User Operations
3.1
User Authentication Function
To authenticate a user before he or she actually uses the machine, user authentication is performed using the
IC card and PIN code. The IC card reader installed in the machine is used to read the IC card. The PIN code
entered is displayed as "*" during the authentication procedure.
If a document is stored in the PKI Encrypted Document User Box of this machine, the print data of the user
in question stored in the PKI Encrypted Document User Box of this machine can be automatically printed
after the authentication by means of the IC card on the control panel is successful. Because printing occurs
after user authentication is performed via the control panel of this machine, it is suitable for printing highly
confidential documents.
!
Detail
Contact the Administrator of the machine if the server is not registered.
3.1.1
User authentication using the IC card
If a document is stored in the PKI Encrypted Document User Box, select any desired login method.
2
Note
Do not leave the machine while you are in the user operation mode. If it is absolutely necessary to leave
the machine, be sure first to log off from the user operation mode.
If a wrong PIN code is entered two or more consecutive times, the IC card is put into a locked state and
becomes no longer valid for authentication. If the IC card is locked, contact the IC card administrator.
This machine is not useful for unlocking the IC card.
If the IC card is locked, a message appears that tells that the IC card cannot be used. Contact the IC
card administrator.
2
Reminder
If there are two or more PKI Encrypted documents are involved, all of them will be printed. To select
and print only a specific document, select [Login] and select the specific document from those in the
PKI Encrypted Document User Box. For the detailed procedure to access the PKI Encrypted document,
see
"Accessing the Encrypted document" on page 3-5
.
The number of consecutive failure count for the locking depends on the setting made on the IC card
side.
If authentication fails, the permissible authentication failure count appears.
Login Method
Description
[Begin Printing]
Prints only the PKI Encrypted document of the corresponding user. The user op-
eration mode screen is not called to the screen.
[Print & Login]
The user operation mode screen is called to the screen after the PKI Encrypted
document of the corresponding user is printed.
[Access] or [Login]
If [Access] or [Login] is selected, only the ordinary login procedure is applicable
and no PKI Encrypted document are printed.