After network configuration, system parameters configuration and user configuration, you can go back to the initial page for identity authentication. The system will authenticate person according to the configured authentication mode.
You can authenticate identity via 1:1 matching or 1:N matching.
After network configuration, system parameters configuration and user configuration, you can go back to the initial page for identity authentication. The system will authenticate person according to the configured authentication mode.
You can authenticate identity via 1:1 matching or 1:N matching.