Authentication methods in Hybrid Access Gateway (HAG) are used as requirements in access rules for authentication. Different authentication methods provide various levels of security.
This article describes authentication methods available in Nexus Hybrid Access Gateway. Authentication methods are used as requirements in access rules for authentication. Different authentication methods provide various levels of security.
|When a user uses a web browser to access a resource, the request flows through a web of specialized services: the access point, the policy service, the authentication service, and back again. But for the user, the single point of contact is the web browser. The access point verifies the identity of the user by forwarding the user credentials via the policy service to the authentication service, which in turn compares the information with credentials stored in the user storage. When the control is completed, a request accept is sent to the access point which allows the user to enter.|
Hybrid Access Gateway supports many authentication methods. Some of the most common ones are listed below.
To choose the right authentication method for your business, consider your users’ needs when it comes to mobility, device flexibility and level of security. It is possible to specify multiple authentication methods for each resource.
For a complete list, see the user interface in Hybrid Access Gateway admin interface.