FortiAuthenticator
FortiAuthenticator provides Identity Access Management and single Sign-On
Free Product DemoFortiAuthenticator provides identity and access management (IAM) services to prevent breaches resulting from unauthorized users gaining access to a network or inappropriate levels of access granted to valid users. FortiAuthenticator ensures only the right person can access your sensitive resources and data at the right time.
User identity information from FortiAuthenticator combined with authentication information from FortiToken and/or FIDO2 authentication ensures that only authorized individuals are granted access to your sensitive information. This additional layer of security greatly reduces the possibility of data leaks while helping companies meet audit requirements associated with government and business privacy regulations.
FortiAuthenticator can identify users through a varied range of methods and integrate with third-party LDAP or Active Directory systems to apply group or role data to the user. FortiAuthenticator is completely flexible and can utilize these methods in combination. For example, in a large enterprise, AD polling or FortiAuthenticator SSO Mobility Agent may be chosen as the primary method for transparent authentication with fallback to the portal for non-domain systems or guest users.
FortiAuthenticator ensures VPNs are protected by secure certificates, removing the overhead involved with certificate management by streamlining the bulk deployment of certificates for VPN use. FortiManager streamlines configuration and automates secure certificate delivery via the SCEP protocol.
INCREASE IDENTITY SECURITY
Seamless and secure MFA authentication across the organization in conjunction with FortiToken
TRANSPARENT USER IDENTIFICATION
Identification of network users and enforcement of identity-driven policy
BETTER USER EXPERIENCE
Single sign-on capabilities for users of both internal and cloud resources
GUEST AUTHENTICATION
Guest management for wired and wireless network security
EASY CERTIFICATE MANAGEMENT
Centralized certificate management for enterprise wireless and VPN deployment
This full working demo lets you explore the many capabilities of FortiAuthenticator - for user identification, single sign-on, and/or two-factor authentication. You can see the range of identity sources (integration with directory services), authentication methods (hardware, software, SMS tokens), end user self-service portal, and more. And you'll quickly learn how easy it is to scalably add these capabilities to a FortiGate deployment.