Go to the table of contents Go to the previous page Go to the next page View or print as PDF
User Identification > Transparent identification
Transparent identification
Web Security Help | Web Security Solutions | Version 7.8.x
Related topics:
In general, transparent identification describes any method that Websense software uses to identify users in your directory service without prompting them for logon information. This includes integrating your Web Security solution with a device or application that provides user information, or using optional Websense transparent identification agents.
*
Websense DC Agent is used with a Windows-based directory service. The agent periodically queries domain controllers for user logon sessions and polls client machines to verify logon status. It runs on a Windows server and can be installed in any domain in the network.
*
Websense Logon Agent identifies users as they log on to Windows domains. The agent runs on a Linux or Windows server, and its associated logon application runs on Windows or Mac clients.
*
Websense RADIUS Agent can be used in conjunction with either Windows- or LDAP-based directory services. The agent works with a RADIUS server and client to identify users logging on from remote locations.
*
Websense eDirectory Agent is used with Novell eDirectory. The agent uses Novell eDirectory authentication to map users to IP addresses.
For instructions on installing each agent, see the Deployment and Installation Center. Agent can be used alone, or in certain combinations.
Both general user identification settings and specific transparent identification agents are configured in the Web Security manager. Go to the Settings > General > User Identification page.
See Configuring user identification methods for detailed configuration instructions.
In some instances, transparent identification agents may not be able to provide correct user information to other components. This can occur if more than one user is assigned to the same machine, or if a user is an anonymous user or guest, or for other reasons. In these cases, you can prompt the user to log on via the browser (see Manual authentication).

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
User Identification > Transparent identification
Copyright 2016 Forcepoint LLC. All rights reserved.