Credential rules
WinGate introduces a credential rules system to manage how user credentials will be treated on a per machine basis. Since a large amount of WinGate operations happen in the context of a user account (access control, logging, accounting etc.) credentials management can be used to provide WinGate with the appropriate setting for how it should handle user connections, and sessions from a particular machine.
Assumed users
Credential rules can be created to allow for the assumption of users based on the IP address, Computername, or Physical address (MAC) of a connecting machine. This is helpful when some client computers run software that cannot authenticate to WinGate, or administrators may wish that users not be required to authenticate, yet have the machine they are connecting from associated with a particular user.
Multi-user machines
In previous versions of WinGate the Multi-user machines feature was available to allow for the individual authentication of users when they were connecting to the Internet through WinGate on a Terminal server. This feature is now handled through the Credential rules system.
Credentials settings
The Credential rules system allows you to manage the default settings for how a users credentials will be handled, when all connections from their machine to WinGate have been closed. This includes setting how long credentials will be cached by WinGate before they are discarded, and how WinGate will treat the existing user credentials from a machine during this cached period.
You can override the credentials settings for a particular computer whenever you create a credential rule that applies to that machine.