Standards-based secure authentication
FortiAuthenticator centralizes the management and storage of user identity information, thereby increasing the efficiency of administration and increasing the control over who accesses the network.
• Two-factor authentication using tokens
1- OATH-compatible time-based tokens (Hardware tokens FortiToken200/FortiToken220)
2- USB certificate-based tokens FortiToken-300)
3- FortiToken Mobile for Android, iOS, and Windows Mobile
4- SMS and email tokens
• Wired/Wireless authentication using the 802. 1X standard
• Certificate management
• Captive portal guest management
• Fortinet Single Sign-On
Improvements to My Organization
Central management of user Identities and access
FortiAuthenticator extends two-factor authentication to multiple FortiGate appliances and to third-party solutions that support RADIUS or LDAP authentication
FortiAuthenticator can create, sign, and revoke X.509 certificates.
FortiAuthenticator can sign user certificate signing requests (CSRs) and distribute certificate revocation lists (CRLs) and CA certificates.
FortiAuthenticator verifies the identity of the external LDAP server by using a trusted CA certificate
FortiAuthenticator has expanded the capabilities of captive portal from credential authentication to include social WiFi authentication and MAC address authentication.
Social WiFi authentication allows FortiAuthenticator to utilize third-party user identity methods to authenticate users into a wireless guest network. Supported authentication methods include:Google+, Facebook, LinkedIn, Twitter which include SMS- and email-based authentication
Fortinet Single Sign-on (FSSO) enables FortiAuthenticator to leverage the existing network authentication systems for firewall authentication. (Windows Active Directory (AD) or Novell eDirectory)
Room for Improvement
1- Integration with different vendor firewalls (I tested only with Cisco using Cisco ASDM 6.3 (5) but i am not sure if it works with other vendor solutions)
2- A lot of configurations are available only from CLI
3- Documentation/videos for different implementation scenarios
Use of Solution
VM platfroms are scalable based on the business needs.
Customer Service and Technical Support
10/10 Technical Support
We used FortiGate to manage tokens and user identities but FortiAuthenticater includes more features.
All Fortinet solutions are easy to implement.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Jun 27 2017