Manage policies
Create Authentication Policies to assign an Authentication Configuration when a host requires network access. Policies are selected for a connecting host by matching host and user data to the criteria defined in the associated User/Host Profile. The first policy that matches the host and user data is assigned.
![]() |
If the host does not match any policy, it is assigned the default authentication method configured in the Portal, Guest Template, or Persistent Agent Credential Configuration. |
![]() |
If you create a User/Host Profile with fields Where (Location) set to Any, Who/What by Group set to Any, Who/What by Attribute left blank and When set to always, it matches ALL users and hosts. This is essentially a Catch All profile. If this User/Host Profile is used in a policy, all policies below that policy are ignored when assigning a policy to a user or a host. To highlight this, policies below the policy with the catch all profile are grayed out and have a line through the data. |
Authentication Policies can be accessed from Policy > Policy Configuration > Authentication Policy.
Settings
An empty field in a column indicates that the option has not been set.
Field |
Definition |
||
---|---|---|---|
Rank Buttons |
Moves the selected policy up or down in the list. Host connections are compared to Policies in order by rank. |
||
Set Rank Button |
Allows you to type a different rank number for a selected policy and immediately move the policy to that position. In an environment with a large number of policies this process is faster than using the up and down Rank buttons. |
||
Table columns |
|||
Rank |
Policy's rank in the list of policies. Rank controls the order in which host connections are compared to Policies. |
||
Name |
User defined name for the policy. |
||
Authentication |
Contains the configuration for the Authentication Policy that will be assigned if this Authentication Policy matches the connecting host. |
||
User/Host Profile |
Contains the required criteria for a connecting host, such as connection location, host or user group membership, host or user attributes or time of day. Host connections that match the criteria within the User/Host Profile are assigned the associated Authentication Configuration. See User/host profiles. |
||
Note |
User specified note field. |
||
Last Modified By |
User name of the last user to modify the policy. |
||
Last Modified Date |
Date and time of the last modification to this policy. |
||
Right click options |
|||
Delete |
Deletes the selected Authentication Policy. |
||
Modify |
Opens the Modify Authentication Policy window for the selected policy. |
||
Show Audit Log |
Opens the Admin Auditing Log showing all changes made to the selected item. For information about the Admin Auditing Log, see Admin auditing.
|