which of the following is NOT a recommended use for this method?

When using Captive Portal to send unidentified users to a Web portal for authentication, which of
the following is NOT a recommended use for this method?

When using Captive Portal to send unidentified users to a Web portal for authentication, which of
the following is NOT a recommended use for this method?

A.
For deployment of Identity Agents

B.
Identity-based enforcement for non-AD users (non-Windows and guest users)

C.
Leveraging identity in Internet application control

D.
Basic identity enforcement in the internal network



Leave a Reply 3

Your email address will not be published. Required fields are marked *


florentjustin

florentjustin

https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62007.htm

Unidentified users log in with a user name and password in a Captive Portal. After authentication, the user clicks a link to go to the destination address.

Recommended Usage:

* Identity based enforcement for non-AD users (non-Windows and guest users)
* You can require deployment of Endpoint Identity Agents

Deployment Considerations:
* Used for identity enforcement (not intended for logging purposes).

Esteban

Esteban

D. Basic identity enforcement in the internal network