All security devices support a built-in user database for authentication. When you define a user on the security device, the device enters the user name and password in its local database.