Get Started with User-ID Best Practices

User-ID™ leverages user context from a wide range of repositories such as directory servers, wireless LAN controllers, VPNs, NACs, proxies, and more, enabling you to:
  • identify users and apply the principle of least privilege to users based on their trust level and behavior, regardless of:
    • Users' locations (such as office or home)
    • Which devices they are using (such as iOS, Android mobile devices, macOS, Windows, Linux desktops, laptops, Citrix, Microsoft VDI or Terminal Servers)
    • Which applications users are accessing
  • protect your corporate credentials from use on third-party websites and prevent reuse of stolen credentials by enabling multi-factor authentication (MFA) at the network layer for any application without any application changes.
The ability to consistently identify the users on your network regardless of location provides better visibility into user activity, enables user- and group-based security policy, and helps you gain more insightful analytics (logging, reporting, and forensics). Use the following best practice guidelines to learn how to plan, deploy, and maintain User-ID in your network.
User-ID supports several features; this guide covers the following features:
Additional features not yet covered in this guide include:

Recommended For You