User Identification Methods Parent topic

User identification identifies which IP address belongs to which user. This allows a method of user identification to be built using an IP address-to-user mapping cache for policy matching. For details about adding rules, see Adding Authentication Rules.
By default, all IP addresses do not automatically work with user identification. Make sure to define which source IP addresses or range of IP addresses must work with user identification. If a source IP address is not in the defined ranges, the IP address will not work for user identification. (In such cases, the policy source IP address must be set to "Any" for user or group policies to work.)
For the specified IP addresses or ranges of IP addresses, define user identification methods including:
  • Transparent authentication (using Windows Client Query and Domain Controller Event Log Query)
  • Captive Portal