Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Defining exceptions to user identification settings
Administrator Help | Forcepoint Web Security and Forcepoint URL Filtering | v8.5.x
Related topics:
Use the User Identification > Add IP Addresses page to identify machines to which specific user identification rules should be applied.
1.
Enter an IP address or network Range in IPv4 or IPv6 format to identify clients to which to apply a specific authentication method, and then click the right-arrow button to add them to the Selected list.
If the same rules should be applied to multiple machines, add them all to the list.
2.
Select an entry in the User identification drop-down list to indicate whether web protection software should attempt to identify users of these machines transparently.
*
Select Try to identify user transparently to request user information from a transparent identification agent or integration device.
*
Select Ignore user information to avoid using any transparent method to identify users.
3.
*
Select Apply computer or network policy to ensure that users are never required to provide logon credentials.
If "Try to identify user transparently" is also selected, users whose credentials can be verified transparently receive the appropriate user-based policy.
*
Select Prompt user for logon information to require users to provide logon credentials. The Default domain context entered for Additional Authentication Options is displayed and will be used.
If "Try to identify user transparently" is also selected, users receive a browser prompt only if they are not identified transparently.
4.
Click OK to return to the User Identification page.
5.
When you are finished updating the Exceptions list, click OK to cache your changes. Changes are not implemented until you click Save and Deploy.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Copyright 2022 Forcepoint. All rights reserved.