6 Basic security recommendations ToC Previous Next

6.2 User security/Access control ToC Previous Next

6.2.1 On calender: ToC Previous Next

On the calender authentication via username and password is commonly used.

Previous Next