Contents

 
 Copyright Notice
Expand Important Information
 Identity Awareness Administration Guide
Expand Terms
Expand Introduction to Identity Awareness
Collapse Configuring Identity Awareness
    Enabling Identity Awareness on the Security Gateway
    Creating Access Roles
    Using Identity Tags in Access Role Matching
   Collapse Using Identity Awareness in the Firewall Rule Base
       Working with Access Role Objects in the Rule Base
       Negate and Drop
    Identifying Users behind an HTTP Proxy Server
Expand Configuring Identity Sources
 Selecting Identity Sources
Expand Identity Awareness Use Cases
Expand Configuring Identity Logging for a Log Server
Expand Identity Awareness Deployment
Expand Advanced Identity Awareness Deployment
Expand Advanced Browser-Based Authentication Configuration
Expand Advanced Identity Agents Configuration
 Kerberos SSO
Expand Command Line Reference
Expand Appendix: Regular Expressions