Defining exceptions to user identification settings
Use the User Identification > Add IP Addresses page to identify machines to which specific user identification rules should be applied.
Steps
-
Enter an IP address or network Range in IPv4 or IPv6 format to identify clients to which to apply a specific authentication method,
and then click the right-arrow button to add them to the Selected list.
If the same rules should be applied to multiple machines, add them all to the list.
-
Select an entry in the User identification drop-down list to indicate whether web protection software should attempt to identify users of these machines
transparently.
- Select Try to identify user transparently to request user information from a transparent identification agent or integration device.
- Select Ignore user information to avoid using any transparent method to identify users.
-
Indicate whether users should be prompted to provide logon credentials via the browser. This setting applies when user information is not available, either because other
identification failed, or because user information was ignored.
- Select Apply computer or network policy to ensure that users are never required to provide logon credentials.
If “Try to identify user transparently” is also selected, users whose credentials can be verified transparently receive the appropriate user-based policy.
- Select Prompt user for logon information to require users to provide logon credentials. The Default domain context entered for
Additional Authentication Options is displayed and will be used.
If “Try to identify user transparently” is also selected, users receive a browser prompt only if they are not identified transparently.
- Select Apply computer or network policy to ensure that users are never required to provide logon credentials.
- Click OK to return to the User Identification page.
- When you are finished updating the Exceptions list, click OK to cache your changes. Changes are not implemented until you click Save and Deploy.