Private sector communications may
set authentication methods and allocate the risk of faulty authentication by contract.
Not exact matches
This process is known as eAuthentication and contains two major
sets of requirements that must be met: the verification of the user prior to the issuance of the credentials (identity proofing) and a technical
authentication method (user name and password).
Be warned, however, that the feature has more than its fair share of hiccups so you may want to
set up an alternate
authentication method.
Click the Configure button and you'll be able to
set up a VPN like you would on an iOS device, choosing the type of VPN server, name, address, account, password, and other
authentication methods.