A colleague of mine, Bryan Wolski has written up a great article for InfoSec Monkey, and while many of the screenshots are Fortinet specific, much of the content applies across the industry as it's pretty open standard speak.
Some IT organizations like to image laptops and ship them out to remote users without having to cache user credentials. For organizations that do this, getting a user logged in to a new device can be