Authentication

In the Authentication tab, configure the methods AFA uses for authenticating users and authenticating devices.

For more details, see Configure user authentication and Integrate ASMS and CyberArk.