Owners of network resources want to verify the identity of users who attempt to access these resources are typically. Identifying a user determines the resources that users can access, and can determine how to personalize the content for that user. Tracking anonymous uniquely is useful so that their history can be used to provide a quality experience when they once again access the network. To identify a user, authentication schemes are used.
Authentication schemes provide a way to collect credentials and determine the identity of a user. During authentication, Web Agents communicate with the Policy Server to determine the proper credentials that must be retrieved from a user who is requesting resources.
The Policy Server supports various authentication schemes. Use simple schemes for low risk network resources and complex schemes for added security for critical network resources.
The Policy Server uses authentication scheme templates, which provide the Policy Server with the information required to process a scheme. Configure authentication scheme templates using the CSP console.
|
Copyright © 2013 CA.
All rights reserved.
|
|