User VPN: User Management Parent topic

Remote authentication is generally used to ensure that employees working off-site can remotely access their corporate network with appropriate security measures in place. In general terms, authentication is the process of attempting to verify the (digital) identity of the sender of a communication such as a login request. The sender may be someone using a computer, the computer itself, or a computer program. Since a computer system should be used only by those who are authorized to do so, there must be a measure in place to detect and exclude any unauthorized access.
Deep Edge controls access to network resources by defining lists of authorized users, called user groups. To use a particular resource, such as a network or VPN tunnel, the user must:
  • Belong to one of the user groups allowed access
  • Correctly specify a username and password to prove his or her identity, if asked to do so