主权项 |
1. An information processing system implemented by one or more information processing apparatuses, the information processing system comprising:
a memory that stores a program; and one or more processors that execute the program stored in the memory to perform a process including
receiving a user identifier and an organization identifier from a terminal, the terminal sending an output job to the information processing system after the user identifier and the organization identifier are authenticated by the information processing system, andreceiving an application identifier, a device identifier, the user identifier, and the organization identifier from an image forming apparatus, the application identifier identifying an application installed in the image forming apparatus, the device identifier identifying the image forming apparatus and being stored in the image forming apparatus, the image forming apparatus outputting the output job sent to the information processing system by the terminal after the application identifier, the device identifier, the user identifier, and the organization identifier are authenticated by the information processing system;performing first authentication in response to the reception of the user identifier and the organization identifier from the terminal based on user information stored in an information storage, the user information associating each of organization identifiers with user identifiers; andperforming second authentication in response to the reception of the application identifier, the device identifier, the user identifier, and the organization identifier from the image forming apparatus based on device information and the user information, the device information associating each of the organization identifiers with device identifiers, wherein the first authentication is performed by searching the user information for a corresponding organization identifier corresponding to the received organization identifier and then comparing the received user identifier with the user identifiers associated with the corresponding organization identifier; and the second authentication includes
performing application authentication based on whether the received application identifier is registered in the information storage,searching the device information and the user information for the corresponding organization identifier corresponding to the received organization identifier,performing device authentication by comparing the received device identifier with the device identifiers associated with the corresponding organization identifier,performing user authentication by comparing the received user identifier with the user identifiers associated with the corresponding organization identifier, anddetermining that the second authentication is successful when all of the application authentication, the device authentication, and the user authentication are successful. |