Knowing user and groups names is only one piece of the
puzzle. The firewall also needs to know which IP addresses map to
which users so that security rules can be enforced appropriately.
User-ID Overview illustrates
the different methods that are used to identify users and groups
on your network and shows how user mapping and group mapping work
together to enable user- and group-based security enforcement and
visibility. The following topics describe the different methods
of user mapping: