Authentication Modes & Login Types
Universal Login Manager incorporates three different authentication modes and five login types, depending on each customer's preference. The authentication modes include Local, Domain and uniFLOW server.
The Local Authentication Mode: Enables the administrator to establish a user data base locally on the device and utilize it as an authentication provider. This database can be exported and imported via a web interface and can be manually distributed to other devices.
The Domain Authentication Mode: Utilizes the customer's existing Windows Active Directory as an authentication provider.
The uniFLOW Server Mode: This login mode Is a customer option for those already using ULM. When a customer's business grows, they now have the capability to easily upgrade to uniFLOW and keep Universal Login Manager as their authentication method. This option minimizes additional investments by customers when upgrading to uniFLOW. ULM also supports 5 different login types, enabling customers to choose their method of access to their devices. These methods include the following:
The Image Login & Image Login + PIN methods allow users to login by pressing a button on the device's UI (user interface), with an image of choice, representing each user account. The Image Login + PIN is identical except users must additionally enter a PIN code to login. Both of these methods can only be used with the Local Authentication Mode.
The Proximity Card Login & Proximity Card Login + PIN methods allow users to perform authentication by using a proximity card such as HID, MIFARE, and others. The supported card reader, MiCard PLUS, must be connected to the device, preferably using the USB Device Port option in order to fit the Card Reader securely inside the device. The Proximity Card Login works with all authentication modes. (Local, AD (Active Directory), or uniFLOW)
The User Name & Password Login simply gives you the option to login with a user name and password, which is registered in the user database. All authentication modes are possible. (Local, AD, or uniFLOW)
Universal Login Manager gives customers the ability to customize the user interface of their devices. This is a fun feature, which allows you to personalize the user interface and incorporate your company logo and colors, or customize it any way you choose.
A few of the main features you can customize is the user interface Theme, as well as the Background Image, and the User ID images used in the Image Login Type.
Access Management System (AMS)
Universal Login Manager integrates with AMS for advanced security options. Found standard on all imageRUNNER ADVANCED devices, AMS establishes access control for print jobs on a per-user/group basis.
Universal Login Manager provides the ability to download a Rich Internet Application for tracking the usage of devices via the Usage Tracker. The Usage Tracker collects job log data from up to 10 registered devices, and collects print, copy, and scan activities per user or per device, including transaction costs.
ULM provides a Pass-Through Login feature, which enables users to access the specific functions allotted to them at any other registered device on their network.
Universal Login Manager is easily upgradable to uniFLOW as your business grows and warrants more advanced functionality. ULM replaces the current uniFLOW Login Manager for MEAP, so when you're ready to upgrade to uniFLOW, you already have the appropriate login manager.
|Supported Devices:||All imageRUNNER ADVANCED Devices|
|Web Browser Requirements:||
A web browser is required in order to access and operate the ULM Configuration and the ULM Usage Tracker.
These web browsers are supported by the Universal Login Manager:
These web browsers are supported by the ULM Usage Tracker:
|Supported Windows Server (for Active Directory):||Windows Server 2003/2008 or later.|
|Optional items:||MiCard PLUS cards reader, USB Device Port for iR-ADV devices|
The Need For Document Security
Beyond the spotlight on multinational, high-profile brands, security incidents can be a persistent threat to every organization, big or small. Those with poorly managed document environments are particularly vulnerable.