About Transparent Identification

Transparent Identification uses several authentication mechanisms to reduce the number of times the user must authenticate to access the Internet. It combines domain-level authentication and the Windows client polling activities into one transparent operation to discover the user credentials and to eliminate the need to manually enter authentication credentials.

If the transparent identification query fails, IWSVA leverages the existing proxy- and browser-based LDAP authentication methods.

Using Transparent Identification, IWSVA:

If the transparent identification query fails, IWSVA will leverage the existing proxy- and the browser-based LDAP authentication method.

Transparent identification solution also applies to the following client platforms:

Transparent identification applies to all deployment modes that support Active Directory (AD) authentication.

See also: