Identity and Access Management

Establishing identity through secure authentication is key in the implementation of an effective security policy. Many of today’s most damaging security breaches have been due to compromised user accounts and passwords exacerbated by users being provided with inappropriate levels of access.

 

Identity and Access Management News

5/09/2018: FortiAuthenticator Release Notes: FortiAuthenticator announces the availability of it latest software release 5.3. Offering improvements to guest and web portal services along with feature enhancements 5.3 cements FortiAuthenticators position as the gatekeeper of the Fortinet Security Fabric.

 

Identity and Access Management Product Details

Identity and Access Management products provide the services necessary to securely confirm the identity of users and devices as they enter the network. Our FortiAuthenticator provides centralized authentication services for the Fortinet Security Fabric including single sign on services, certificate management, and guest management. FortiToken further confirms the identity of users by adding a second factor to the authentication process through physical and mobile application based tokens. The combination of FortiAuthenticator and FortiToken offers a robust response to the challenges today's businesses face in the verification of user and device identity.

 

Features and Benefits

icon benefits secure authentication

Intuitive, centralized authentication and authorization services

Ensure the right people get appropriate access to your data
icon benefits migration

Two factor token authentication and management

Increase certainty of user identity through the addition of a second factor
simple icon

Single sign-on (SSO) for both Web/Cloud and network resources

Fortinet Single sign-on (FSSO) and SAML2.0 support
icon benefits management

Guest, BYOD, and Certificate Management

Customizable portals including self-service capabilities
intelligent icon

Simple deployment and licensing

No recurring license fees
Compliance icon

Integration with Secure Directories

Leverage existing user databases