Fortinet FortiAuthenticator Implementation Team

JM
Network admin at Penobscot Valley Hospital

We used a third party in conjunction with higher level Fortinet support for deployment. We had to get a certificate and the third party helped us with that, and then we had to talk with Microsoft too, so it was tricky.

During setup it was hard to make sure that the solution was doing what it was supposed to do. There were different factors that made it difficult, but it might have been because the person who was trying to implement the solution didn't understand it fully. There were some inconsistencies in standards for active directory account names, for example, usually you'd have first initial, last name, and that would be your domain name. However, we had some older users, myself included, that had a different format that included their department name, like 46-JMoore for example, and the authenticator didn't understand that. You'd have to tell the user, "Okay, you're using this old formatting for your username, but you need to put it in differently so the authenticator can understand it." It wasn't really the authenticator's problem, but more so had to do with fitting the environment into the authenticator's configuration.

View full review »
Yati Gharat - PeerSpot reviewer
Chief Technology Officer at Litmus

We deploy the solution in-house. Our team supports our clients and manages their environment.

View full review »
Javed Bashir - PeerSpot reviewer
Senior Manager, Network & Cloud Security Architect at a computer software company with 1,001-5,000 employees

Our company provides professional software development services to different clients.

View full review »
Buyer's Guide
Fortinet FortiAuthenticator
April 2024
Learn what your peers think about Fortinet FortiAuthenticator. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.
MM
Security Manager at Yarix S.r.l.

The deployment time is variable. Due to occasional weaknesses in the API, deployment time can vary. Sometimes it's easy, and sometimes not due to these factors.
We managed the deployment ourselves. In another business unit of my company, we're integrators for this tool. We handle the sale and implementation projects, so we have the required competencies.

For example, we need to set up the network and integrate it with the desired resolution for the deployment process. Then, deploy the client zone to the users' mobile phones, enabling them to use virtual authentication configurations.

The solution is deployed both on-prem and cloud. The staff needed includes engineers, developers, and sometimes even technical support for custom API creation and customer designations.

View full review »
Yuvaraj P - PeerSpot reviewer
Network & Security Engineer at Viroka Technology Private Limited
EC
Presales Engineer at a comms service provider with 5,001-10,000 employees

In-house engineers, properly trained, are responsible for deployment and maintenance.

View full review »
SC
Network Manager at a computer retailer with 11-50 employees

We provide implementation and maintenance support for all our customers.

View full review »
Jozef Beliansky - PeerSpot reviewer
Network engineers at a government with 501-1,000 employees

It was easy for me, but I had to read the documents about LDAP authentication. I did an in-house self-configuration. It was time-consuming.

View full review »
Sheryar Saqib - PeerSpot reviewer
Sr Network Security Engineer at a tech services company with 501-1,000 employees

We design and then, Fortinet team will implement.

View full review »
JJ
Mechnical, of 1 adjustment and assembly at Daumar

We did the deployment in-house. 

View full review »
HL
System Engineer - Security at a educational organization with 1,001-5,000 employees

We did the implementation of Fortinet FortiAuthenticator in-house and we have two people for the maintenance.

View full review »
PD
Assistant Infrastructure Manager at a maritime company with 1,001-5,000 employees

We used a team of three people for deployment and maintenance.

View full review »
it_user589359 - PeerSpot reviewer
Senior Consultant at a tech company with 1,001-5,000 employees

It is quite straightforward to set up the FortiAuthenticator. We mainly deploy as a virtual machine. An OVF file is provided by Fortinet and you just simply compile the file in the VMware environment. Upon simple configuration, such as IP address and default gateway, you can access the web GUI and do any configuration, as you like.

View full review »
RP
Channel Account Manager-Lead-West at a tech services company with 1,001-5,000 employees

We had a system integrator to assist us with the implementation and deployment. The implementation partner does not have sufficient expertise.

One or two engineers can implement it.

View full review »
SS
Information Technology Manager at a tech services company with 51-200 employees

We had certified Fortinet engineers assist us with the initial implementation. They handled the setup and configurations as well.

View full review »
MH
Senior Security Engineer at a tech services company with 201-500 employees

We handled the implementation ourselves.

View full review »
Buyer's Guide
Fortinet FortiAuthenticator
April 2024
Learn what your peers think about Fortinet FortiAuthenticator. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.