Specifications
7
White Pa
p
er: Canon ima
g
eRUNNER ADVANCE Securit
y
System Manager Screen
Store ID and Password Screen
Section 2 — Device Security
2.3 – Access Control
Canon imageRUNNER ADVANCE systems support a number of access control options to help you
manage the use of device settings and functions in addition to specific capabilities of certain functions.
Access control solutions for the imageRUNNER ADVANCE can help Authentication, Authorization, and
Auditing. Canon offers solutions that can lock down the entire device, or simply lock down specific
functions (e.g. Send-to-Email), while leaving other applications available for general use. With the power
and flexibility of MEAP, some solutions can be customized to meet your specific requirements.
Password-Protected System Settings
As a standard feature, imageRUNNER ADVANCE systems setup screens support password protection to
restrict device setting changes from the control panel and Remote UI tool. System Administrators can set
network information, system configuration, enable, and disable network and printing protocols among
many other options. Canon highly recommends setting an administrator password at time of installation
since it controls critical device settings.
Access Management System
The Access Management System, which is standard on imageRUNNER ADVANCE systems, can be used
to tightly control access to device functionality. Restrictions can be assigned to users and groups, to restrict
entire functions or restrict specific features within a function. Access restrictions are managed in units
called “roles”. Roles contain information that determines which of the various functions of the device may
be used or not.
Roles can be set up based on individual user’s job title or responsibilities or by group, enabling the
administrator to create roles specific to certain departments or workgroups. Since the administrator is not
limited to restricting all or none of a particular function, the roles can be as specific as is required for a
number of business needs. Beyond the Base roles which contain default access restrictions, up to 100 new
Custom roles can be registered for up to 5,000 users. The administrator can also define whether to allow
unregistered users to log in as guests and then specify settings for guest user’s roles.