User's Manual

Chapter 5: User Management
136
Remote authentication follows the process specified in the flowchart
below: