Authenticating users to Kerio Control
Kerio Control can authenticate users on the network. By authenticating users, Kerio Control can associate people with devices. This allows you to create policies and monitor activities of identifiable people rather than anonymous devices.
Kerio Control can authenticate users via:
- Kerio Control web interface. For more information refer to Authenticating users to Kerio Control.
- Automatic login — Kerio Control permanently associates a user to a device based on the device IP or MAC addressMedia Access Control Address - A unique identifier that specifies a device in a network.. For more information refer to Configuring automatic user login.
- RADIUSRemote Authentication Dial-In User Service - A protocol that offers authentication, authorization, and accounting of users in a network. — For more information refer to Using RADIUS server in Kerio Control.
- VPNVirtual private network - A network that enables users connect securely to a private network over the Internet. — See Configuring Kerio VPN server and Configuring IPsec VPN for details.
Troubleshooting user authentication
If users have problems authenticating to Kerio Control, you can use the Debug or Error logs to view messages related to the web interface and user authentication. See Using the Debug log and Using the Error log for details.