2. Authentication.................................................................................................. 5
Login Services.....................................................................................................................................6
Overview.............................................................................................................................................. 6
User Authentication...............................................................................................................................9
Authentication Settings........................................................................................................................ 13
Configuring Picture Login.....................................................................................................................13
Management of Users....................................................................................................................... 17
3. Security Function...........................................................................................20
Security of Storage............................................................................................................................21
Storage Management.......................................................................................................................... 21
Encryption of Storage.......................................................................................................................... 21
Encryption Key....................................................................................................................................21
Security Policy Function.................................................................................................................... 24
Specifications..................................................................................................................................... 24
Purpose of This Function..................................................................................................................... 27
Advantages and Restrictions................................................................................................................27
Function Overview.............................................................................................................................. 27
Setting Procedure............................................................................................................................... 28
Restricted Settings.............................................................................................................................. 29
Contents
i
Contents