Policy Guides

Twingate supports a number of different Security Policy rules. Details for each is included in the individual guides referenced below.

Authentication settings allow determining re-authentication frequency and 2FA requirements

Two-factor Authentication settings are applied to authentication requirements

Device-only Resource Policies can be configured to only evaluate device requirements

Trusted Devices determines whether devices must be trusted (either manually or automatically) to meet Security Policy requirements

Last updated 15 days ago