Back=right
mouse click.
Transparent Identification uses several authentication mechanisms to reduce the number of times the user must authenticate to access the Internet. It combines domain-level authentication and the Windows client polling activities into one transparent operation to discover the user credentials and to eliminate the need to manually enter authentication credentials.
If the transparent identification query fails, IWSVA leverages the existing proxy- and browser-based LDAP authentication methods.
Using Transparent Identification, IWSVA:
Parses the events in the security log on the Active Directory server to achieve an IP-user mapping relationship
Retrieves Windows client's active users and domain names
Uses the fetched information to match with policies to reduce the pop-up authentication window messages as much as possible
If the transparent identification query fails, IWSVA will leverage the existing proxy- and the browser-based LDAP authentication method.
Note: Transparent identification solutions only apply to Windows AD 2003, 2008 and 2012 environments.
Transparent identification solution also applies to the following client platforms:
Window 2000
Windows XP
Windows 2003
Windows 2008
Windows Vista
Windows 7
Windows 8
Windows 2012
Transparent identification applies to all deployment modes that support Active Directory (AD) authentication.