User-ID provides many different methods for mapping
IP addresses to usernames. Before you begin configuring user mapping,
consider where your users are logging in from, what services they
are accessing, and what applications and data you need to control
access to. This will inform which types of agents or integrations
would best allow you to identify your users.