Authenticating users to Kerio Control

Kerio Control can authenticate users on the network. By authenticating users, Kerio Control can associate people with devices. This allows you to create policies and monitor activities of identifiable people rather than anonymous devices.

Kerio Control can authenticate users via:

Troubleshooting user authentication

If users have problems authenticating to Kerio Control, you can use the Debug or Error logs to view messages related to the web interface and user authentication. See Using the Debug log and Using the Error log for details.

See also: