Skip to content Skip to navigation Skip to footer

Identity and Access Management (IAM) Products and Services

Securely connect every identity to your resources and simplify management with enhanced user experience

Identity and Access Management (IAM) Products and Services banner background banner dots

Overview

Today’s enterprise identity environments are made up of various systems of record ranging from networking devices, servers, directory services, and cloud applications. Managing an identity that resides in these various systems can quickly grow into such a large administrative challenge that it negatively affects users, administrators, and application developers.

Additionally, many of today’s most damaging security breaches have been due to compromised user accounts and passwords exacerbated by users being provided with inappropriate levels of access. Securely and effectively managing identity authentication and authorization for all systems and applications is crucial to minimize security breaches.

Identity and Access Management Models and Specifications

View by:

Hardware Appliances

Total Users
500
說明
4x GE RJ45 ports, 1x 1 TB HDD
Total Users
2,000
說明
4x GE RJ45 ports, 2x 1 TB HDD
Total Users
10,000
說明
4x GE RJ45 ports, 2x GE SFP, 2x 2 TB HDD
Total Users
20,000
說明
4x GE RJ45 ports, 2x GE SFP, 2x 2 TB SAS Drive
Total Users
40,000
說明
4x GE RJ45 ports, 2x GE SFP, 2x 2 TB SAS Drive

Please see the product page for more information on these and many more Product features. 

 

Virtual Machines

使用者
100
說明
Base FortiAuthenticator-VM with 100 user license
使用者
+100
說明
License to add 100 users to base VM
使用者
+1000
說明
License to add 1000 users to base VM
使用者
+10000
說明
License to add 10000 users to base VM
使用者
+100000
說明
License to add 100000 users to base VM

FortiToken

說明
Two factor authentication application for mobile devices
說明
Standard multi-form factor OATH compliant hardware token
說明
Hardware USB token for X.509 PKI certificates

Please see the product page for more information on these and many more Product features.  

FortiAuthenticator offers an Amazon Web Services (AWS) BYOL (bring your own license) option.  Please see the AWS Marketplace listing for more information:

 

FortiAuthenticator Ecosystem

FortiAuthenticator provides integration with many leading IT vendors as part of the Fortinet Security Fabric. Below is a list of current FortiAutheticator Alliance Partners:

Enhance security and productivity while minimizing the burden on IT

The increase in cloud-based applications and connected devices have changed the way we work. This has also expanded the attack surface, giving cybercriminals more opportunities for targeted attacks. To avoid breaches, organizations need to ensure the right users are accessing the right network resources using cloud identity and access management (cloud IAM).

Fortinet User Authentication provides you with the tools and capabilities for effective authentication, acess, and identity management of users, devices, and guests or partners. You can federate identity to provide a great experience for your users.

Flexible deployment options let you decide the best way to deploy the solution, depending on your needs. Choose on-premises ready-to-use hardware, a virtual machine, managed cloud, or identity-as-a-service (IDaaS). Quickly integrate Fortinet IAM with existing authentication infrastructure such as active directory (AD) or LDAP, or with new services through cloud service providers. 

 

Get Better Security with Multi-Factor Authentication (MFA)

Get Better Security Access with Multi-Factor Authentication (MFA)

Providing secure access to applications, services, or software development hosted on-premises or in the cloud, while offering ease of use for end users, is a constant challenge.

You can make it much tougher for hackers to gain access to protected information through the use of additional credentials such as a one-time passcode (OTP). OTP is one component of MFA. MFA is a crucial security feature of any IAM solution because it requires verification of multiple credentials:

  • Something the user knows: a username and password.
  • Something the user has: an OTP in the form of a token or code. This is sent to the user via email or SMS, to a hardware token generator, or to an authenticator application installed on the user’s smartphone.
  • Something specific to the user: biometric information such as the user’s finger print.

Therefore, even if a cybercriminal has a username and password, they cannot access the system without the other information.

Fortinet MFA provides easy-to-use secure access to corporate VPNs, Wi-Fi, on-premises, or cloud-based apps. Users can quickly log on by responding to a push notification on their smart device during the authentication process.

學到更多
Increase security and easier access with IAM Single Sign-On (SSO)

Increase Security While Providing Easier Access for Users with Single Sign-on (SSO)

Centrally managing user identities and their access to organizational resources is the most effective identity and access management (IAM) security practice. With the IAM centralized solution, IT admins can enforce password complexity requirements and multi-factor authentication. Plus, Fortinet IAM delivers a better user experience when accessing services and applications in the cloud or on premises.

Single sign-on (SSO) technology is a key component of IAM that enables users to securely authenticate with multiple applications and websites by logging in only once. However, not all SSO solutions are built equally. Some providers offer an SSO solution for web-based applications, while others leverage public cloud infrastructure. Still, other SSO solutions are designed for on-premises services including applications, file storage, servers, and networks. Solely adopting a web-based-application SSO solution is inefficient for effective identity security because cloud infrastructure and on-premises services will have different SSO requirements. As a result, managing (and federating) identities will largely remain decentralized and would require integration efforts across different SSO solutions to provide true SSO capability.

Fortinet FortiAuthenticator provides a comprehensive approach to SSO with centralized identity management. It authenticates users with traditional on-premises as well as modern web and cloud authentication protocols. Organizations gain full control. You can securely connect your users to appropriate resources in the cloud or on premises while improving their experience.

學到更多

Features and Benefits

icon benefits secure authentication

Intuitive, centralized authentication and authorization services

Ensure the right people get appropriate access to your data, resources, and applications
icon benefits migration

Multi-factor authentication and management

Increase certainty of user identity with the verification of another factor
simple icon

Single sign-on (SSO) for web/cloud applications and network resources

Fortinet SS0 (FSSO) including modern authentication protocols federating identity for SSO (SAML, oAuth, OIDC, and API support)
icon benefits management

Guest, BYOD, and certificate management

Customizable portals including self-service capabilities
intelligent icon

Simple deployment and licensing

Flexible deployment modes (appliances, VMs, cloud) with non-recurring or renewal licensing options
Compliance icon

Integration with secure directories

Leverage existing identity systems of record on-premises or in the cloud

IAM Product Details

Fortinet IAM products provide the services necessary to securely confirm the identities of users and devices as they enter the network. With our robust identity acess management solution, you can control and manage identity to securely allow the right users to only the appropriate resources.

The Fortinet IAM solution includes the following products:

  • FortiAuthenticator protects against unauthorized access to corporate resources by providing centralized authentication services for the Fortinet Security Fabric, including single sign-on services, certificate management, and guest access management.
  • FortiToken further confirms the identity of individual users by adding a second factor to the authentication process through physical or mobile-application tokens.
  • FortiToken Cloud offers multi-factor authentication (MFA) as a service. Organizations can use its intuitive dashboard to manage MFA.

The combination of FortiAuthenticator and FortiToken or FortiToken Cloud effectively addresses the identity and access management challenges organizations face in this era of rapidly increasing user and device connectivity.

Identity and Access Management News

5/09/2018: FortiAuthenticator Release Notes: FortiAuthenticator announces the availability of it latest software release 5.3. Offering improvements to guest and web portal services along with feature enhancements 5.3 cements FortiAuthenticators position as the gatekeeper of the Fortinet Security Fabric.