Authentication

In the Authentication tab, configure the methods AFA uses for authenticating users and authenticating devices.

For more details, see Configure user authentication and Integrate ASMS and CyberArk.

Back to top