In this section: Acquiring Identities for Active Directory Users Acquiring Identities with Browser-Based Authentication Acquiring Identities with Endpoint Identity Agents Acquiring Identities in a Terminal Server Environment Acquiring Identities in Application Control |