User-ID Best Practices
User-ID leverages user context from a wide range of repositories to identify users and apply the principle of least privilege to users based on their trust level and behavior. User-ID protects your corporate credentials from use on third-party websites and prevents reuse of stolen credentials by enabling multi-factor authentication (MFA) at the network layer for any application without any application changes.
What Do You Want To Do?
Featured Topics
User-ID Best Practices for GlobalProtect
Learn how to prepare to deploy, configure, and monitor GlobalProtect for use with User-ID.
User-ID Best Practices for Redistribution
Learn the best ways for planning, deploying, and verifying redistribution for User-ID information, along with other data types.
User-ID Best Practices for Group Mapping
Learn best practices for connecting to directory servers and other sources of user information to create group mappings for use in security policy.
User-ID Best Practices for Dynamic User Groups
Steps to help you plan, deploy, and maintain Dynamic User Groups with User-ID.