Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The first step of the configuration is the registration of a user account and password. The next step is to assign a group/permissions to each account. These configurations only let verified users control specific functions.

...

...

For more information about the Identity and Access Management feature, please refer to the Security section.