Twingate supports a number of different Security Policy rules. Details for each is included in the individual guides referenced below.
-> Authentication settings allow determining re-authentication frequency and 2FA requirements
-> Two-factor Authentication settings are applied to authentication requirements
-> Device-only Resource Policies can be configured to only evaluate device requirements
-> Platform restrictions allow blocking certain device platforms
-> Trusted Devices determines whether devices must be trusted (either manually or automatically) to meet Security Policy requirements
Last updated 2 hours ago