User-ID Best Practices

Table of Contents
Filter icon
Expand all | Collapse all

User-ID leverages user context from a wide range of repositories to identify users and apply the principle of least privilege to users based on their trust level and behavior. User-ID protects your corporate credentials from use on third-party websites and prevents reuse of stolen credentials by enabling multi-factor authentication (MFA) at the network layer for any application without any application changes.

What Do You Want To Do?

Featured Topics

User-ID Best Practices for GlobalProtect

Learn how to prepare to deploy, configure, and monitor GlobalProtect for use with User-ID.

User-ID Best Practices for Redistribution

Learn the best ways for planning, deploying, and verifying redistribution for User-ID information, along with other data types.

User-ID Best Practices for Group Mapping

Learn best practices for connecting to directory servers and other sources of user information to create group mappings for use in security policy.

User-ID Best Practices for Dynamic User Groups

Steps to help you plan, deploy, and maintain Dynamic User Groups with User-ID.