Trusted Devices

Applicability

This rule can be applied to Network Sign In Policies and Resource Policies.

Functionality

This rule allows you to require that the device used to sign in or access a Resource is marked as a Trusted Device. For example, if a Resource Policy is in place requiring Trusted Devices, a user attempting to access a Resource protected by this policy from an untrusted device will be blocked. The policy requirement can be enforced for any device with the Twingate Client app, regardless of platform or location.

Last updated 1 year ago