Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The first step of the Security configuration is the registration of a user account and password. The next step is to assign a security level to each account. These configurations only let verified users control specific functions.