You can use the system itself or an external server to limit which users can use the system.
If you use the authentication function built-in to the system (machine authentication), you can limit use to only users who are registered on the system.
Alternatively, if user information is managed on a server, you can perform authentication on the system with that existing server.