Security set up and management

Remote Manager allows users with certain roles and privileges to perform operations, such as making changes or setting up device operations. Each user must be assigned a role when a user account is created.

In addition to user roles, you can create security polices that assign security to devices, require that users log in from a specific IP address or a range of IP addresses, or require two-factor authentication.