Next Previous Contents

13. Authentication Configuration

This next screen shows the different options for authenticating the users of the system.

13.1 What this Does

The first two options are for local authentication and should be left as they are for maximum security. The other three options are from remote authentication on a network. Unless you know how to use these authentication services, leave them disabled for now.



Next Previous Contents 1