A method and apparatus for enabling a user to obtain verification and gain
access to a network server accessible only after verification without the
user having to be aware of the communications method and verification
protocol involve an image forming apparatus selecting a verification
protocol having the highest level of security from among a plurality of
previously determined verification protocols. The process of selecting
the verification protocol with the highest level of security is then
repeated with the verification protocol having the next highest level of
security from among the remaining verification protocols until a
connection to the network server is successfully established.