Use case
This describes a case in which an organization with a single domain wants to authenticate requests from 2 common web browsers. They also want to bypass authentication for web applications that do not support authentication.
An organization—let’s call it Best Corp—uses Content Gateway. They have one domain (BCORP), and one domain controller. They use IWA to authenticate users.
Best Corp wants to ensure that:
- Requests from common web browsers are authenticated. They control which web browsers are allowed on their computers.
- Web applications that don’t support authentication bypass authentication. The User-Agent feature of rule-based authentication makes this possible.
To configure the solution, Best Corp: