Configure Identity Policies
You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the FDM dashboards, and configure access control based on user or user group.
The following is an overview of how to configure the elements required to obtain user identity through identity policies: