Overview:
        FortiAuthenticatorTM user identity management appliances strengthen enterprise security by simplifying
          and centralizing the management and storage of user identity information.
        Enterprise Network Identity Policy
        Network and Internet access is key for almost every role within the enterprise;
          however, this requirement must be balanced with the risk that it brings. The
          key objective of every enterprise is to provide secure but controlled network
          access enabling the right person the right access at the right time, without
          compromising on security
        Fortinet Single Sign-On is the method of providing secure identity and rolebased access to the Fortinet connected network. Through integration with
          existing Active Directory or LDAP authentication systems, it enables enterprise
          user identity-based security without impeding the user or generating work for
          network administrators.
        FortiAuthenticator builds on the foundations of Fortinet Single Sign-on,
          adding a greater range of user identification methods and greater scalability.
          FortiAuthenticator is the gatekeeper of authorization into the Fortinet secured
          enterprise network identifying users, querying access permissions from third
          party systems, and communicating this information to FortiGate devices for
          use in Identity-Based Policies.
        FortiAuthenticator delivers transparent identification via wide range of
          methods:
        
          - Polling an Active Directory Domain Controller 
 
          - Integration with FortiAuthenticator Single Sign-On Mobility Agent which
            detects login, IP address changes, and logout 
 
          - FSSO Portal-based authentication with tracking widgets to reduce the
            need for repeated authentications 
 
          - Monitoring RADIUS Accounting Start records
 
        
        FortiAuthenticator FSSO Features
        
          - Enables identity and role-based security
            policies in the Fortinet secured enterprise
            network without the need for additional
            authentication through integration with
            Active Directory 
 
          - Strengthens enterprise security by
            simplifying and centralizing the
            management of user identity information
        
 
        Additional FortiAuthenticator Features
        
          - Secure Two-factor/OTP Authentication
            with full support for FortiToken 
 
          - RADIUS and LDAP Authentication 
 
          - Certificate management for enterprise
            VPN deployment 
 
          - IEEE802.1X support for wired and
            wireless network security 
 
          - SAML SP/IdP Web SSO
 
        
        
       
      
        Highlights:
        Key Features and Benefits
        
          
            | FSSO Transparent User Identification | 
            Zero impact for enterprise users | 
          
          
            | Integration with LDAP and AD
              for group membership | 
            Utilizes existing systems for network authorization information, reducing deployment times and
              streamlining management processes. Integration with existing procedures for user management | 
          
          
            | Wide range of user
              identification methods | 
            Flexible user identification methods for integration with the most diverse enterprise environments  | 
          
          
            | Enablement of identity
              and role-based security | 
            Allows security administrator to give users access to the relevant network and application resources
              appropriate to their role, while retaining control and minimizing risk | 
          
        
        FortiAuthenticator Single Sign-On User
          Identification Methods
        FortiAuthenticator can identify users through a varied range of methods and
          integrate with third party LDAP or Active Directory systems to apply group
          or role data to the user and communicate with FortiGate for use in Identitybased policies. FortiAuthenticator is completely flexible and can utilize these
          methods in combination. For example, in a large enterprise, AD polling
          or FortiAuthenticator SSO Mobility Agent may be chosen as the primary
          method for transparent authentication with fallback to the portal for nondomain systems or guest users.
        Active Directory Polling
        User authentication into an active directory is detected by regularly polling domain controllers.
          When a user login is detected, the username, IP, and group details are entered into the
          FortiAuthenticator User Identity Management Database and according to the local policy, can
          be shared with multiple FortiGate devices. 
        FortiAuthenticator SSO Mobility Agent
        For complicated distributed domain architectures where the polling of domain controllers is
          not feasible or desired, an alternative is the FortiAuthenticator SSO Client. Distributed as part
          of FortiClient or as a standalone installation for Windows PCs, the client communicates login,
          IP stack changes (Wired > Wireless, wireless network roaming), and logout events to the
          FortiAuthenticator, removing the need for polling methods.
        FortiAuthenticator Portal and Widgets
        For systems that do not support AD polling or where a client is not feasible, FortiAuthenticator
          provides an explicit authentication portal. This portal allows the users to manually authenticate
          to the FortiAuthenticator and subsequently into the network. To minimize the impact of repeated
          logins required for manual authentication, a set of widgets is provided for embedding into an
          organization’s intranet that automatically logs the users in with browser cookies whenever
          they access the intranet homepage.
        RADIUS Accounting Login
        In a network that utilizes RADIUS authentication (e.g. wireless or VPN authentication),
          RADIUS Accounting can be used as a user identification method. This information is used
          to trigger user login and to provide IP and group information, removing the need for a
          second tier of authentication.
        Additional Functionality
        Strong User Identity with Two-factor Authentication
        FortiAuthenticator extends two-factor authentication capability
          to multiple FortiGate appliances and to third party solutions that
          support RADIUS or LDAP authentication. User identity information
          from FortiAuthenticator combined with authentication information
          from FortiToken ensures that only authorized individuals are granted
          access to your organization’s sensitive information. This additional
          layer of security greatly reduces the possibility of data leaks while
          helping companies meet audit requirements associated with
          government and business privacy regulations.
        FortiAuthenticator supports the widest range of tokens possible
          to suit your user requirements. With the physical time-based
          FortiToken 200, FortiToken Mobile (for iOS and Android), e-mail and
          SMS tokens, FortiAuthenticator has token options for all users and
          scenarios. Two-factor authentication can be used to control access
          to applications such as FortiGate management, SSL and IPsec VPN,
          Wireless Captive Portal login and third party, RADIUS compliant
          networking equipment.
        To streamline local user management, FortiAuthenticator includes
          user self-registration and password recovery features.
        Enterprise Certificate-based VPNs 
        Site-to-site VPNs often provide access direct to the heart of the
          enterprise network from many remote locations. Often these VPNs
          are secured simply by a pre-shared key, which, if compromised,
          could give access to the whole network. FortiOS support certificatebased VPNs; however, the use of certificate secured VPNs has been
          limited, primarily due to the overhead and complexity introduced by
          certificate management. FortiAuthenticator removes this overhead
          involved by streamlining the bulk deployment of certificates for VPN
          use in a FortiGate environment by cooperating with FortiManager for
          the configuration and automating the secure certificate delivery via
          the SCEP protocol.
        For client-based certificate VPNs, certificates can be created and
          stored on the FortiToken 300 USB Certificate store. This secure,
          pin protected certificate store is compatible with FortiClient and
          can be used to enhance the security of client VPN connections in
          conjunction with FortiAuthenticator.
        Additional Features and Benefits
        
          
            | RADIUS and LDAP User Authentication | 
            Local Authentication database with RADIUS and LDAP interfaces centralizes user management | 
          
          
            | Wide Range of Strong Authentication Methods | 
            Strong authentication provided by FortiAuthenticator via hardware tokens, e-mail, SMS, e-mail
              and digital certificates help to enhance password security and mitigate the risk of password
              disclosure, replay, or brute forcing | 
          
          
            | User Self-registration and Password Recovery | 
            Reduces the need for administrator intervention by allowing the user to perform their own
              registration and resolve their own password issues, which also improves user satisfaction | 
          
          
            | Integration with Active Directory and LDAP | 
            Integration with existing directory simplifies deployment, speeds up installation times, and
              reutilizes existing development | 
          
          
            | Certificate Management | 
            Streamlined certificate management enables rapid, cost-effective deployment of certificatebased authentication methods such as VPN | 
          
          
            | 802.1X Authentication | 
            Deliver enterprise port access control to validate users connection to the LAN and Wireless
              LAN to prevent unauthorized access to the network |