Identity and Access Management

Secure Network Authentication - Gatekeeping the Network

web product icon identity access management

Identity and Access Management Overview

Establishing identity through secure authentication is key in the implementation of an effective security policy. Many of today’s most damaging security breaches have been due to compromised user accounts and passwords exacerbated by users being provided with inappropriate levels of access.

 

Identity and Access Management News

  • May 1, 2019
    FortiOS 6.2 enables Security Fabric Integration for FortiAuthenticator.
    New FortiAuthenticator 6.0 software when paired with FortiOS 6.2 enables the integration of FortiAuthenticator into the Security Fabric. Now administrators can add their FortiAuthenticator to their FortiGate and have it seen in both their logical and physical network topology views and monitor authentication services. Several widgets are available which can offer valuable visibility into this extremely important aspect of network security.
  • Apr 26, 2019
    FortiToken Cloud Launched
    FortiToken Cloud is back and more feature rich. FortiToken Cloud is Fortinet’s first entry into the Identity as a Service Market (IDaaS). It offers everything needed to implement two factor in your FortiGate environment including FortiToken Mobile as part of the service subscription.

Identity and Access Management Product Details

Identity and Access Management products provide the services necessary to securely confirm the identity of users and devices as they enter the network. Our FortiAuthenticator provides centralized authentication services for the Fortinet Security Fabric including single sign on services, certificate management, and guest management. FortiToken further confirms the identity of users by adding a second factor to the authentication process through physical and mobile application based tokens. The combination of FortiAuthenticator and FortiToken offers a robust response to the challenges today's businesses face in the verification of user and device identity.

 

Features and Benefits

icon benefits secure authentication

Intuitive, centralized authentication and authorization services

Ensure the right people get appropriate access to your data
icon benefits migration

Two factor token authentication and management

Increase certainty of user identity through the addition of a second factor
simple icon

Single sign-on (SSO) for both Web/Cloud and network resources

Fortinet Single sign-on (FSSO) and SAML2.0 support
icon benefits management

Guest, BYOD, and Certificate Management

Customizable portals including self-service capabilities
intelligent icon

Simple deployment and licensing

No recurring license fees
Compliance icon

Integration with Secure Directories

Leverage existing user databases

Identity and Access Management Models and Specifications

Fortinet Identity and Access Management products offer a robust response to the challenges today's businesses face in the verification of user and device identity.

FortiAuthenticator provides centralized authentication services for the Fortinet Security Fabric including single sign on services, certificate management, and guest management.

Hardware Appliances

Total Users
500
Description
4x GE RJ45 ports, 1x 1 TB HDD
Total Users
2,000
Description
4x GE RJ45 ports, 2x 1 TB HDD
Total Users
10,000
Description
4x GE RJ45 ports, 2x GE SFP, 2x 2 TB HDD
Total Users
20,000
Description
4x GE RJ45 ports, 2x GE SFP, 2x 2 TB SAS Drive
Total Users
40,000
Description
4x GE RJ45 ports, 2x GE SFP, 2x 2 TB SAS Drive

Please see the product page for more information on these and many more Product features. 

 

Virtual Machines

Users
100
Description
Base FortiAuthenticator-VM with 100 user license
Users
+100
Description
License to add 100 users to base VM
Users
+1000
Description
License to add 1000 users to base VM
Users
+10000
Description
License to add 10000 users to base VM
Users
+100000
Description
License to add 100000 users to base VM

FortiToken further confirms the identity of users by adding a second factor to the authentication process through physical and mobile application based tokens.

Description
Two factor authentication application for mobile devices
Description
Standard multi-form factor OATH compliant hardware token
Description
Hardware USB token for X.509 PKI certificates

To review the relevant data sheets click here

FortiToken Cloud offers secure cloud management of two-factor authentication for FortiGate environments from provisioning to revocation. 

Click here for FortiToken Cloud Service login.

FortiAuthenticator offers a public cloud BYOL (bring your own license) option through AWS Marketplace and Azure Marketplace.  For more information please click on the links below:

 

Identity and Access Management Use Cases

Fortinet User Authentication provides businesses with the tools to effectively manage user identity and authentication, guest management, and two-factor authentication. This flexible solution allows businesses to decide the best way to deploy and suit their needs with on-premises ready-to-use hardware, virtual machine, managed cloud, or Identity-as-a-Service (IDaaS) options. Whether customers have existing authentication infrastructure such as active directory, LDAP, or are utilizing new services through Google or other vendors, they are able to quickly integrate Fortinet’s fully featured suite of products to suit the needs of any business.

Product Demo

This full working demo lets you explore the many capabilities of FortiAuthenticator - for user identification, single sign-on, and/or two-factor authentication. You can see the range of identity sources (integration with directory services), authentication methods (hardware, software, SMS tokens), end user self-service portal, and more. And you'll quickly learn how easy it is to scalably add these capabilities to a FortiGate deployment.