Next
Previous Contents
13. Authentication Configuration
This next screen shows the different options for authenticating the users
of the system.
13.1 What this Does
The first two options are for local authentication and should be left as
they are for maximum security. The other three options are from remote
authentication on a network. Unless you know how to use these authentication
services, leave them disabled for now.
Next Previous
Contents