Quantcast
Channel: Fortinet GURU
Browsing all 2380 articles
Browse latest View live

Types of authentication

Types of authentication FortiOS supports two different types of authentication based on your situation and needs: security policy authentication and Virtual Private Network (VPN) authentication....

View Article


Authentication servers FortiGate Methods

Authentication servers FortiGate units support the use of external authentication servers. An authentication server can provide password checking for selected FortiGate users or it can be added as a...

View Article


FortiGate Users and user groups

Users and user groups FortiGate authentication controls system access by user group. By assigning individual users to the appropriate user groups you can control each user’s access to network...

View Article

FortiGate Managing guest access

Managing guest access Visitors to your premises might need user accounts on your network for the duration of their stay. If you are hosting a large event such as a conference, you might need to create...

View Article

FortiGate Authentication timeout

Authentication timeout An important feature of the security provided by authentication is that it is temporary—a user must reauthenticate after logging out. Also if a user is logged on and...

View Article


Password policy

Password policy Password authentication is effective only if the password is sufficiently strong and is changed periodically. By default, the FortiGate unit requires only that passwords be at least...

View Article

Authentication protocols

Authentication protocols When user authentication is enabled on a security policy, the authentication challenge is normally issued for any of the four protocols, HTTP, HTTPS, FTP, and Telnet, which are...

View Article

Authentication in captive portals

Authentication in captive portals Network interfaces, including WiFi interfaces, can perform authentication at the interface level using a captive portal — an HTML form that requests the user’s name...

View Article


Authentication in security policies

Authentication in security policies Security policies control traffic between FortiGate interfaces, both physical interfaces and VLAN subinterfaces. The firewall tries to match the session’s user or...

View Article


VPN authentication

VPN authentication All VPN configurations require users to authenticate. Authentication based on user groups applies to: l SSL VPNs l PPTP and L2TP VPNs l an IPsec VPN that authenticates users using...

View Article

Captive portals

Captive portals A captive portal is a convenient way to authenticate web users on wired or WiFi networks. This section describes: l Introduction to captive portals l Configuring a captive portal l...

View Article

What is a security certificate?

What is a security certificate? A security certificate is a small text file that is part of a third-party generated public key infrastructure (PKI) to help guarantee the identity of both the user...

View Article

Certificates overview

Certificates overview Certificates play a major role in authentication of clients connecting to network services via HTTPS, both for administrators and SSL VPN users. Certificate authentication is...

View Article


Troubleshooting certificates

Troubleshooting certificates There are times when there are problems with certificates — a certificate is seen as expired when its not, or it can’t be found. Often the problem is with a third party web...

View Article

Configuring certificate-based authentication

Configuring certificate-based authentication You can configure certificate-based authentication for FortiGate administrators, SSL VPN users, and IPsec VPN users. In Microsoft Windows 7, you can use the...

View Article


Authenticating administrators with security certificates

Authenticating administrators with security certificates You can install a certificate on the management computer to support strong authentication for administrators. When a personal certificate is...

View Article

Authenticating SSL VPN users with security certificates

Authenticating SSL VPN users with security certificates While the default self-signed certificates can be used for HTTPS connections, it is preferable to use the X.509 server certificate to avoid the...

View Article


Authenticating IPsec VPN users with security certificates

Authenticating IPsec VPN users with security certificates To require VPN peers to authenticate by means of a certificate, the FortiGate unit must offer a certificate to authenticate itself to the peer....

View Article

Support for per-VDOM certificates

Support for per-VDOM certificates The CA and local certificate configuration is available per-VDOM. When an admin uploads a certificate to a VDOM, it will only be accessible inside that VDOM. When an...

View Article

Image may be NSFW.
Clik here to view.

Single sign-on using a FortiAuthenticator unit

Single sign-on using a FortiAuthenticator unit If you use a FortiAuthenticator unit in your network as a single sign-on agent, l Users can authenticate through a web portal on the FortiAuthenticator...

View Article
Browsing all 2380 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>