4.1. User authorization
Your rights to access the system’s information and functions are identified when you enter
the system on the basis of the identification parameters. For authorization purposes you need to enter correct login
and password (Fig. 5).
Fig. 5 “Entering system”
As for collective users and collective administrators, in addition, the IP address of
designated computer is verified in terms of the permitted range of IP addresses. All users, who have not passed
authorization when entering the system, are given the guest status.