Figure 2

« 
Previous
|
|
Next
 »

Figure 2: In the second step of the installation, you enable authentication with the email domain.