Policy Guides

Twingate supports a number of different Security Policy rules. Details for each is included in the individual guides referenced below.

-> Authentication settings allow determining re-authentication frequency and 2FA requirements

-> Two-factor Authentication settings are applied to authentication requirements

-> Device-only Resource Policies can be configured to only evaluate device requirements

-> Platform restrictions allow blocking certain device platforms

-> Trusted Devices determines whether devices must be trusted (either manually or automatically) to meet Security Policy requirements

Last updated 2 minutes ago