You can use the machine itself or an external server to limit which users can use the system.
If you use the authentication function built-in to the machine (machine authentication), you can limit use to only users who are registered on the machine.
Alternatively, if user information is managed on a server, you can perform authentication on the system with that existing server.