Go to the table of contents Go to the previous page Go to the next page View or print as PDF
User Identification for Policy Enforcement
User Identification for Policy Enforcement
Administrator Help | Forcepoint Web Security and Forcepoint URL Filtering | v8.5.x
To apply policies to users and groups, web protection software must be able to identify the user making a request, given the originating IP address. Various identification and authentication methods are available for the on-premises software:
*
*
*
(Forcepoint Web Security only) Content Gateway uses one or more several supported methods (including Integrated Windows Authentication, Legacy NTLM, LDAP, and RADIUS) to authenticate user requests (see the Content Gateway Manager Help).
This option may be used in conjunction with a transparent identification agent to provide a fallback method for applying user-based policies when user authentication is unavailable.
*
(Forcepoint URL Filtering only) A third-party integration product identifies or authenticates users, and then passes user information to web protection software.
A list of supported integration products is available in the Deployment and Installation Center.
With the Hybrid Module, the hybrid service must likewise be able to identify or authentication users to apply user and group based policies.
*
*
*
Ping Federate and Microsoft Active Directory Federation Services (AD FS), as well as any other SAML 2.0 Compliant Identity Provider, are supported.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
User Identification for Policy Enforcement
Copyright 2023 Forcepoint. All rights reserved.