Policy Guides

Twingate supports a number of different Security Policy rules. Details for each is included in the individual guides referenced below.

Authentication settings allow determining re-authentication frequency and 2FA requirements

Two-factor Authentication settings are applied to authentication requirements

Device-only Resource Policies can be configured to only evaluate device requirements

Trusted Devices determines whether devices must be trusted (either manually or automatically) to meet Security Policy requirements

Last updated 6 hours ago