Users need to login to be able to configure the device.
The authentication uses the MAC address of the device (usually printed on the device).
The status of the device and the services that are running.
A list of the installed applications and configuration of their settings.
The configuration of the network interfaces of the device.
The configuration of the network proxy settings.
The configuration of the time settings for the device.