Authentication

In the Authentication tab, configure the methods AFA uses for authenticating users and authenticating devices.

For more details, see Configure user authentication and Integrate AFA and CyberArk.

Back to top