Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Identifying users > User authentication methods
User authentication methods
Getting Started Guide | Forcepoint Web Security Cloud
You can enable various methods to identify and authenticate users. User authentication is used if it is required by your policy, or if the user is accessing a website for which a policy exception is configured. Authentication is always required for roaming users connecting from an unknown IP address.
 
Tip 
User authentication settings are configured on the Access Control tab of a policy. Authentication methods are listed below, in the order in which they are used by the service, if enabled in a policy.
*
*
*
*
*
Note: basic authentication uses the HTTP authentication standard. While this is available as a default fall-back, Forcepoint recommends that you do not rely on this option, and enable at least one of the other authentication options.
 
Note 

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Identifying users > User authentication methods
Copyright 2022 Forcepoint. All rights reserved.