You can use the User Management page to configure the authentication methods that the device uses to verify that a user can gain access. For each login attempt, the device tries the authentication methods in order, starting with the first one, until the password matches.
If you do not configure system authentication, users are verified based on their configured local passwords.
To configure system authentication:
Note: After you make changes to the configuration in this window, you must commit the changes immediately for them to take effect. To commit all changes to the active configuration, select Commit Options > Commit. See Using the Commit Options to Commit Configuration Changes (J-Web Procedure) for details about all commit options.
If you want to use multiple methods to authenticate users, repeat this step to add the additional methods to the Selected Methods list.