Get Started with User-ID Best Practices
Expand all | Collapse all
End-of-Life (EoL)
Get Started with User-ID Best Practices
User-ID™ leverages user context from a wide range of
repositories such as directory servers, wireless LAN controllers,
VPNs, NACs, proxies, and more, enabling you to:
identify users and apply the principle of least privilege
to users based on their trust level and behavior, regardless of:
Users' locations (such as office or home)
Which devices they are using (such as iOS, Android® mobile devices,
macOS®, Windows®, Linux desktops, laptops, Citrix, Microsoft VDI
or Terminal Servers)
Which applications users are accessing
protect your corporate credentials from use on third-party websites
and prevent reuse of stolen credentials by enabling multi-factor
authentication (MFA) at the network layer for any application without
any application changes.
The ability to consistently identify the users on your network
regardless of location provides better visibility into user activity,
enables user- and group-based security policy, and helps you gain
more insightful analytics (logging, reporting, forensics). Use the
following best practice guidelines to learn how to plan, deploy,
and maintain User-ID in your network.
User-ID supports several features; this guide covers the following
features:
Additional features not yet covered include:
IP Address-to-Username Mapping from:
Network Access
Control (NAC)
Authentication Portal
Active Directory