Important: Key user rights are required to perform the following steps.

Important: It is essential to check with the company's IT department whether the security policy allows external users to be set up. For enterprise systems, VPN access must be set up for the external users or the system must be configured so that it can be accessed from outside the company network.

Create a new external user as described in the second section of the following instructions: Instructions for creating a new user.

If you want to restrict the write permissions of the external user, perform the following steps: Instructions for restricting the write permissions of a user.

Tip: First register the external user with an email address that can be accessed. This must not correspond to any of the email addresses stored in the system. When the new user logs in, check that access works as configured.