Overview of our User-ID technology that can gather user identity from multiple sources including VPNs, WLAN controllers, captive portals, directory servers, proxies and more.