Fortinet FortiAuthenticator Primary Use Case
JM
Jim Morrill
Network admin at Penobscot Valley Hospital
The solution syncs with our active directory and allows configuration for
two-factor authentication. We're using the two-factor authentication for our Office 365 email and cloud. We needed a way to use the authenticator to configure a trusted network so that when the users are in-house, on our network, they don't get prompted for two-factor. We don't want to go through that rigmarole every time, so basically it authenticates through active directory that this trusted network that we're on is going to encrypt the data. Then, when they're not on a trusted network or they're at home and trying to log in, the user gets a SMS message to put in a token to validate their identity for their email username and password.
Fortinet FortiAuthenticator is used as an IAM tool.
We use the solution for different clients and how they authenticate for VPN and Wi-Fi. We also use it for the captive portal and single sign-on. We use it for quite a bit for authentication.
View full review »Buyer's Guide
Fortinet FortiAuthenticator
April 2024
Learn what your peers think about Fortinet FortiAuthenticator. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.
We use the solution for identity access management. The people who manage our network devices use the tool as an SSO tool for security or interconnectivity. We use it for remote access, too. We use it in our environment and three of our clients’ environments. We haven’t faced any issues.
View full review »VS
Viswanathan Selvakumar
Senior Manager at Allsec Technologies Ltd
We use the tool for two-factor authentication. We use it for our remote VPN needs.
View full review »The solution allows connectivity when switching between LAN and Wi-Fi primarily, and it also uses it for free tokens. So we can share tokens across multiple firewalls.
We use the product for multi-factor authentication, single sign-on, and FIDO integration. We utilized it while logging into Windows and remote SSL VPN with MFA.
View full review »MM
MatteoMazzei
Security Manager at Yarix S.r.l.
FortiAuthenticator provides multi-factor authentication. After testing your username and password, it adds another layer of authentication where FortiAuthenticator challenges you with a number provided by the FortiToken app on your mobile phone.
View full review »In my company, we use Fortinet FortiAuthenticator as a AAA server. We use it to integrate with LDAP and integrate with FortiGate in multiple locations with centralized authentication. We can authenticate the users since Fortinet FortiAuthenticator allows for two-factor authentication and FortiClient.
NM
Nick Munro
Technology Services Director at a computer software company with 11-50 employees
We use Fortinet FortiAuthenticator, mostly where wireless or wired authentication needs to be integrated between multiple identity stores.
View full review »My environment is multi-cloud. I have a production workload in Nigeria. I have some data centers in Continental Europe and in the East US in multiple regions. We operate both on-premises and on two different public clouds: AWS and Azure. At the time, because of how Fortinet worked, we connected to our customers via remote access VPN.
Because of the nature of Amazon Infiniti, it had a very big impact in Africa and on how we implemented our SA as the most effective authentication service for our VPN.
Originally, when people tried to connect, they had to put in their original credentials and send a request back. The issue here started before software tools were being used, and hardware tools had to be used for privacy. We had to have five firewalls and five different token devices. It was very clumsy and not efficient.
We decided to go with FortiAuthenticator because it provides us with a single point of authentication, instead of having an authenticator on each one of the firewalls. Only five to twelve hours are connected on the back and then Citrix will send us an email or a text message. We can then easily and seamlessly use the solution.
EC
Ernesto Chang
Presales Engineer at a comms service provider with 5,001-10,000 employees
We primarily use Fortinet FortiAuthenticator to centralize the management of user identity information in Security Architectures, enforce Role-Based authentication, and allow Two Factor authentication with Softclient support.
This is a must-have technology in Fortinet implementations with several gateways and distributed environments.
It is easy to set up and will reduce Network administrators' efforts to integrate diverse identification methods. Must evaluate Single Sing On Mobility Agents to full integration of users position on the network and complete the solution.
View full review »SC
reviewer1372281
Network Manager at a computer retailer with 11-50 employees
We use the product network device authentication for Linux and Windows server integrations.
View full review »SM
Simone Meddi
Architect engineer at DGS S.P.A.
In my recent job, I worked in tandem with Fortinet to enable 802.1X authentication for the Wi-Fi environment.
View full review »
I am using Fortinet FortiAuthenticator for SSL and logins.
View full review »ZH
Zsolt Horvath
CEO at Prosperátor Kft.
We connect FortiAuthenticator to different servers' active directories and use it for value authentication and VPN client authentication.
We use FortiAuthenticator for server login, terminal servers, Windows servers, and Linux servers. We have configured the solution for SSL VPN authentication with a Fortinet token.
We use it for single sign-on. After connecting to VPN it creates an active directory or up session and we know who it is and then we use Fortinet FortiAuthenicator.
View full review »We are resellers of this solution and partners of Fortinet. I'm the managing director and we are based in South Africa.
View full review »RR
RAMACHANDRAR
Director - Global Solutions & Customer Service at Brits & Byte IT Consulting
The basic use we have for FortiAuthenticator is multi-pack authentication.
View full review »We use Fortinet FortiAuthenticator to maintain security, and access, and monitor authentication and authorization processes. It enables the proper functioning of the CA server. We can use various authentication methods, including EFTOS parameters like PKI (Public Key Infrastructure) for the CA server.
View full review »We are using FortiAuthenticator for authentication to connect to our network, either through some software or VPN or SSL or CyberArk, anything.
View full review »We primarily use the solution to gain VPN access to the main client site.
View full review »HL
reviewer1160370
System Engineer - Security at a educational organization with 1,001-5,000 employees
We're using Fortinet FortiAuthenticator to bypass identity to the Fortinet FortiGate. We do not use FortiAuthenticator too much because it is middleware.
View full review »MS
Mohammed Salhi
Security Engineer at Futuretec
We are a solution provider and we work with Fornet products, including FortiAuthenticator. I have installed it for a bank and their users authenticate their access through it.
Our implementation involved the creation of local users for the VPN, and they are authenticated using this product. This is the main purpose of it, and what had been requested by the client.
View full review »DS
Dennis Seyersdahl
IT System Manager at RPM INNOVATIONS, INC.
This solution is used for 2FA for Desktop and VPN access. Each computer, server and VPN access has to have a 2FA and the solution allowed us to accomplish this with a fob or phone app. We use the fob as phones are not owned by the company.
View full review »DP
reviewer2325093
Network Security Engineer at a computer software company with 51-200 employees
As a customer I’m currently testing the solution.
WA
WahidAlarasi
Solutions Architect at Exclusive GRP
I am a solution architect and my company works purely for Fortinet, implementing all versions on a daily basis, so we're not end-users. The company is an exclusive distributor implementing the product.
The primary use case of the product is usually for multifactor authentication using two-factor authentication with tokens. Sometimes people require two factors with a token. Sometimes they need the latest POC. I do a proof of concept for windows login. They need the agent who authenticates with SMS, token or email.
View full review »Our company is based in Latin America and we work mainly in areas relating to telecommunications in the banking, retail and public sectors. We are partners with Fortinet.
View full review »AD
reviewer1294911
Manager at a financial services firm with 501-1,000 employees
Our primary use case for Fortinet FortiAuthenticator is, first of all, as a two-factor VPN for enhanced access security. We use this product to provide secure access for all of our employees.
Our other use cases have to do with using FortiAuthenticator for other security projects which includes things like access to some important web applications.
View full review »AN
reviewer1412841
MS at a consultancy with 11-50 employees
My customers use this solution for accessing banking applications online.
I'm a reseller. I sell to my customers, and they use whatever I have. I provide Fortinet for my customers.
We work with the latest version of this solution. It is deployed on the Fortinet cloud. We don't do it independently.
There are 3,000 customers using this solution in my company on a daily basis.
View full review »Our primary use case for the product is to enable two-factor authentication for our VPN solutions within FortiGate. Additionally, we utilize it to secure our FortiWeb tool security portal with two-factor authentication.
View full review »EM
Eugene Milon
Network Security Engineer at a tech services company with 51-200 employees
We implement FortiAuthenticator in situations where there are multiple Active Directory domains. Other use cases include:
- When we need to use FortiClient to keep track of users as they move around different locations where normal FSSO would have issues
- When we need to use one FortiToken for multiple Fortigates
- When we want to use it as a domain controller.
The FortiAuthenticator can do many things.
View full review »PD
reviewer934035
Assistant Infrastructure Manager at a maritime company with 1,001-5,000 employees
FortiAuthenticator can be useful for network security, resource security, and server security. It is a cloud-based solution.
View full review »IM
Ibrahim Massad
Senior Network & Security Engineer at a tech services company with 11-50 employees
Fortinet FortiAuthenticator is being used in our clients' companies. These companies are medium to enterprise level.
View full review »AO
Ayokunmi Ogundapo
Systems Administrator at Interswitch
We use this solution for two-factor authentication of most of our services. It includes VPN but also many other services that we have on our internet servers. We use the on-premise version because we also want it integrated into our in-house applications. We are customers of Fortinet and I'm a systems administrator.
DN
reviewer1446546
IT Manager at a tech services company with 11-50 employees
Our primary use case is two-factor authentication, and we use it for a handful of our clients.
View full review »RP
reviewer1753020
Channel Account Manager-Lead-West at a tech services company with 1,001-5,000 employees
The primary use case is internal authentication.
View full review »DD
Drissa DOUMBIA
Network Security Engineer at Technicom Mali
We use this product for SSL two-factor authentication and FortiToken management.
View full review »We primarily use the solution to get users.
View full review »MH
reviewer1189323
Senior Security Engineer at a tech services company with 201-500 employees
We primarily use the solution for FortiToken multi-factor authentication and as a VPN for login devices, among other cases.
View full review »Buyer's Guide
Fortinet FortiAuthenticator
April 2024
Learn what your peers think about Fortinet FortiAuthenticator. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.