Structure of Usage Restrictions

In the Access Management System, device usage restriction information is managed in units called "roles." Roles enable you to set which functions of a device are allowed to be used.
When operating with local device authentication, use User Authentication via a Web browser to set individual roles for each user of each device.
When operating with server authentication, create role and user association information.