Gestion des identités et des accès

Authentification réseau sécurisée - Contrôle des accès au réseau

Disponibles en:
  • Appareil
  • Machine Virtuelle
  • Nuage

Identity and Access Management

Establishing identity through secure authentication is key in the implementation of an effective security policy. Many of today’s most damaging security breaches have been due to compromised user accounts and passwords exacerbated by users being provided with inappropriate levels of access.

 

Identity and Access Management News

5/09/2018: FortiAuthenticator Release Notes: FortiAuthenticator announces the availability of it latest software release 5.3. Offering improvements to guest and web portal services along with feature enhancements 5.3 cements FortiAuthenticators position as the gatekeeper of the Fortinet Security Fabric.

 

Identity and Access Management Product Details

Identity and Access Management products provide the services necessary to securely confirm the identity of users and devices as they enter the network. Our FortiAuthenticator provides centralized authentication services for the Fortinet Security Fabric including single sign on services, certificate management, and guest management. FortiToken further confirms the identity of users by adding a second factor to the authentication process through physical and mobile application based tokens. The combination of FortiAuthenticator and FortiToken offers a robust response to the challenges today's businesses face in the verification of user and device identity.

 

Features and Benefits

icon benefits secure authentication

Intuitive, centralized authentication and authorization services

Ensure the right people get appropriate access to your data
icon benefits migration

Two factor token authentication and management

Increase certainty of user identity through the addition of a second factor
simple icon

Single sign-on (SSO) for both Web/Cloud and network resources

Fortinet Single sign-on (FSSO) and SAML2.0 support
icon benefits management

Guest, BYOD, and Certificate Management

Customizable portals including self-service capabilities
intelligent icon

Simple deployment and licensing

No recurring license fees
Compliance icon

Integration with Secure Directories

Leverage existing user databases

Identity and Access Management Models and Specifications

Hardware Appliances

Total Users
500
Description
4x GE RJ45 ports, 1x 1 TB HDD
Total Users
2,000
Description
4x GE RJ45 ports, 2x 1 TB HDD
Total Users
10,000
Description
4x GE RJ45 ports, 2x GE SFP, 2x 2 TB HDD
Total Users
20,000
Description
4x GE RJ45 ports, 2x GE SFP, 2x 2 TB SAS Drive
Total Users
40,000
Description
4x GE RJ45 ports, 2x GE SFP, 2x 2 TB SAS Drive

Please see the product page for more information on these and many more Product features. 

 

Virtual Machines

Utilisateurs
100
Description
Base FortiAuthenticator-VM with 100 user license
Utilisateurs
+100
Description
License to add 100 users to base VM
Utilisateurs
+1000
Description
License to add 1000 users to base VM
Utilisateurs
+10000
Description
License to add 10000 users to base VM
Utilisateurs
+100000
Description
License to add 100000 users to base VM

FortiToken

Description
Two factor authentication application for mobile devices
Description
Standard multi-form factor OATH compliant hardware token
Description
Hardware USB token for X.509 PKI certificates

Please see the product page for more information on these and many more Product features.  

FortiAuthenticator offers an Amazon Web Services (AWS) BYOL (bring your own license) option.  Please see the AWS Marketplace listing for more information:

 

FortiAuthenticator Demo

product demo fortiauthenticator

FortiAuthenticator Demo

This full working demo lets you explore the many capabilities of FortiAuthenticator - for user identification, single sign-on, and/or two-factor authentication. You can see the range of identity sources (integration with directory services), authentication methods (hardware, software, SMS tokens), end user self-service portal, and more. And you'll quickly learn how easy it is to scalably add these capabilities to a FortiGate deployment.

Access the demo