Policy Guides
Twingate supports a number of different Security Policy rules. Details for each is included in the individual guides referenced below.
→ Authentication settings allow determining re-authentication frequency and 2FA requirements
→ Two-factor Authentication settings are applied to authentication requirements
→ Device-only Resource Policies can be configured to only evaluate device requirements
→ Trusted Devices determines whether devices must be trusted (either manually or automatically) to meet Security Policy requirements
Last updated 6 hours ago