Transparent Identification uses several authentication mechanisms to reduce the number
of times the user must authenticate to access the Internet. It combines domain-level
authentication and the Windows client polling activities into one transparent operation
to discover the user credentials and to eliminate the need to manually enter authentication
credentials.
If the transparent identification query fails, IWSVA leverages the existing proxy-
and browser-based LDAP authentication methods.
Using Transparent Identification, IWSVA:
-
Parses the events in the security log on the Active Directory server to achieve an
IP-user mapping relationship
-
Retrieves Windows client's active users and domain names
-
Uses the fetched information to match with policies to reduce the pop-up authentication
window messages as much as possible
If the transparent identification query fails, IWSVA will leverage the existing proxy-
and the browser-based LDAP authentication method.
 |
Note
Transparent identification solutions only apply to Windows AD 2003, 2008 and 2012
environments.
|
Transparent identification solution also applies to the following client platforms:
-
Window 2000
-
Windows XP
-
Windows 2003
-
Windows 2008
-
Windows Vista
-
Windows 7
-
Windows 8
-
Windows 2012
Transparent identification applies to all deployment modes that support Active Directory
(AD) authentication.