Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Configuring Web Settings > Configure Bypass Settings
Configure Bypass Settings
 
Related topics:
The cloud service includes the following options for bypassing security and authentication checks, if required for your end users:
*
The Authentication Bypass tab enables you to add custom settings that bypass authentication and content filtering for applications, user agents, and sites for which authentication with the cloud service is problematic. If you have an I Series appliance or a supported edge device, you can add authentication bypass rules for internal networks behind the device. See Bypassing authentication settings.
*
The Proxy Bypass tab enables you to add, and import in bulk, destinations that bypass the cloud service for all policies. See Adding and importing sites that bypass the proxy.
*
The SSL tab enables you to specify trusted HTTPS domains that your end users can always access even if the certificate is detected to be invalid (see Bypassing certificate verification), and to define web categories that should never be decrypted for end users authenticating with single sign-on or secure form-based authentication. For I Series appliances, this applies to all authentication methods. See Bypassing authentication decryption.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Configuring Web Settings > Configure Bypass Settings
Copyright 2020 Forcepoint. All rights reserved.