Fortinet FortiAuthenticator Benefits
The product has become a central hub for how dozens of our clients authenticate to VPN and Wi-Fi. It has given us a very easy way to manage dozens of customers and how they authenticate and troubleshoot. It gives us a one-stop shop for everything. The solution is very easy to manage. When we have multiple customers authenticating to multiple domain controllers, it centralizes all that from an MSP perspective.
View full review »EC
Ernesto Chang
Presales Engineer at a comms service provider with 5,001-10,000 employees
Using this product strengthens enterprise security. It offers role-based security policies and User Identity Management with different methods.
This product provides automatization. There is a self-service user portal for registry and support for domain and non-domain guest users, with diverse channels vía hardware tokens, software tokens, e-mail, and SMS.
This solution brings user satisfaction. It reduces the need for network administrator intervention by allowing the user to perform their own registration and resolve their own password problems and issues.
View full review »RR
RAMACHANDRAR
Director - Global Solutions & Customer Service at Brits & Byte IT Consulting
FortiAuthenticator has helped a lot of our customers in the way that they do the business when they onboard their clients to the data center. It has drastically changed what they used to do earlier after the installation.
View full review »Buyer's Guide
Fortinet FortiAuthenticator
April 2024
Learn what your peers think about Fortinet FortiAuthenticator. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.
HL
reviewer1160370
System Engineer - Security at a educational organization with 1,001-5,000 employees
Fortinet FortiAuthenticator has improved our organization because we are able to can create identity-based policies. For example, who are you and where are you. We are shifting from the IP-based to the identity-based.
View full review »By using one of our units as a load-balancing slave, we were able to roll out location-based VPNs that created quicker connections to local servers for our end users. Furthermore, incorporating a LBS unit has provided preventative measures and ensured that our remote users can still connect if a failure occurs on our master authentication unit.
View full review »DS
Dennis Seyersdahl
IT System Manager at RPM INNOVATIONS, INC.
This was a regulation we needed to fill and it worked at a good price. It provided a solution that allowed us to fulfill the requirement.
View full review »AN
reviewer1412841
MS at a consultancy with 11-50 employees
FortiAuthenticator has made our operations secure.
View full review »It made things much easier for dealing with users BYOD for our secured wireless networks. We also use this in conjunction with an MDM solution. It makes a nice package that is easy for our end-users and is very secure.
View full review »EM
Eugene Milon
Network Security Engineer at a tech services company with 51-200 employees
It keeps track of users and their IPs no matter where they are in the network. When users roam, we don't have to worry about not mapping them to an IP.
View full review »AO
Ayokunmi Ogundapo
Systems Administrator at Interswitch
Security is such a big issue these days, a password alone is no longer enough for securing identity. In that sense, providing a second layer of authentication for users gives the company some level of comfort.
View full review »It integrated with the existing Cisco wireless infrastructure to solidify the way people authenticate onto the network. It permitted having a centralized area to authenticate all users and enabled SSOimplementation.
View full review »When we came across access management, we required several technical features to help manage user access to critical systems and remote access. That’s why we always go for a SSO two-factor authentication server. FortiAuthenticator is a bundle of these features. It has its own hardware and software token for two-factor authentication. It supports single sign-on and seamless integration with user-based web filtering, without any prior authentication. It can act as a Radius server to support other systems for Radius authentication. One of the common practices is using FortiAuthenticator with Dot1.X network access control.
View full review »We are now enjoying social login in public Wi-Fi environments with very easy deployment and a maximum level of security.
View full review »Central management of user Identities and access
FortiAuthenticator extends two-factor authentication to multiple FortiGate appliances and to third-party solutions that support RADIUS or LDAP authentication
FortiAuthenticator can create, sign, and revoke X.509 certificates.
FortiAuthenticator can sign user certificate signing requests (CSRs) and distribute certificate revocation lists (CRLs) and CA certificates.
FortiAuthenticator verifies the identity of the external LDAP server by using a trusted CA certificate
FortiAuthenticator has expanded the capabilities of captive portal from credential authentication to include social WiFi authentication and MAC address authentication.
Social WiFi authentication allows FortiAuthenticator to utilize third-party user identity methods to authenticate users into a wireless guest network. Supported authentication methods include:Google+, Facebook, LinkedIn, Twitter which include SMS- and email-based authentication
Fortinet Single Sign-on (FSSO) enables FortiAuthenticator to leverage the existing network authentication systems for firewall authentication. (Windows Active Directory (AD) or Novell eDirectory)
View full review »Buyer's Guide
Fortinet FortiAuthenticator
April 2024
Learn what your peers think about Fortinet FortiAuthenticator. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.