User guide

Chapter 5: User Management
136
Remote authentication follows the process specified in the flowchart
below: