I have a customer requirement that no user should be able to use the network resources (proxy, firewall authentication, mail etc etc.) without being authenticated on the network level, say, every morning. Typically we observe that machines have a le...