The use of the system and user identification is controlled via the user management and login. The current level of security can be increased in the case of specific customer requirements.