Remote authentication is generally used to ensure that employees
working off-site can remotely access their corporate network with appropriate security
measures
in place. In general terms, authentication is the process of attempting to verify
the (digital)
identity of the sender of a communication such as a login request. The sender may
be someone
using a computer, the computer itself, or a computer program. Since a computer system
should be
used only by those who are authorized to do so, there must be a measure in place to
detect and
exclude any unauthorized access.
Deep Edge controls access to network
resources by defining lists of authorized users, called user groups. To use a particular
resource, such as a network or VPN tunnel, the user must:
- Belong to one of the user groups allowed access
- Correctly specify a username and password to prove his or her identity, if asked to
do
so