Identity Awareness - Comparison of Acquisition Sources

These tables show how identity sources are different in terms of usage and environment considerations. Based on these considerations, you can configure Identity AwarenessClosed Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. to use one or more identity of these identity sources (see Selecting Identity Sources).