Device Security > Authentication List
Device Security
RM GUI HiSecOS EAGLE20/30
Release
3.0
09/2015
85
Device Security > Authentication List
3.2 Authentication List
The device allows users to access its management functions when they log
in with valid login data exclusively. The device authenticates the users either
using the local user management or with a RADIUS server in the network.
In this dialog you manage the authentication lists. In a list you specify which
method the device uses for the authentication. Here you have the option to
differentiate the application with which the device is accessed, e.g. via a
console or with the graphical user interface.