Skip to content

Introduction

This guide 📝 is intended for individuals who will be using the system via a user interface to authenticate and authorize themselves. The aim of this guide is to provide you with a step-by-step guide for using the system. The system can be critical for protecting sensitive data and ensuring data security, so it is essential that you understand how to use the system and how to minimize potential risks 💡. Please read this guide carefully and do not hesitate to contact us if you have any questions or encounter any problems.