FortiAuthenticator

X

Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

Subscribe

I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.


Course Schedule

  • 2 Days Course
    Network Security

    Classroom + Online

    Course Details

    In this two-day class, you will learn how to use FortiAuthenticator for secure authentication.

     

    In interactive labs, you will explore how to authenticate users, with FortiAuthenticator acting as a RADIUS, LDAP, or 802.1X EAP server, a certificate authority (CA), and logon event collector that uses — and extends — the Fortinet Single Sign-On (FSSO) framework to transparently authenticate users. You will explore captive portal guest management, FortiTokens, and digital certificates.

    Objectives

    After completing this course, you will be able to:

    • Deploy and configure FortiAuthenticator
    • Configure the LDAP and RADIUS service
    • Configure the self-service portal
    • Configure Captive Portal guest management (social Wi-Fi)
    • Configure FortiAuthenticator and FortiGate for two-factor authentication
    • Provision USB SmartCard FortiToken 200 hardware and FortiToken mobile software tokens
    • Manage digital certificates (root CA, sub-CA, user, and local services digital certificates)
    • Configure FortiAuthenticator as SCEP server for CRLs and CSRs
    • Configure FortiAuthenticator as a logon event collector using the FSSO communication framework
    • Configure FortiAuthenticator for wired/wireless 802.1x authentication, MAC-based authentication, and machine-based authentication using supported EAP methods
    • Troubleshoot authentication failures

    Outline

    1. Introduction to FortiAuthenticator
    2. Deploying and Configuring FortiAuthenticator
    3. Administering and Authenticating Users
    4. Captive Portal
    5. Two-factor Authentication
    6. Certificate Management
    7. Fortinet Single Sign-On
    8. 802.1X Authentication
    9. Troubleshooting

    Target Audience

    • Anyone who is responsible for day-to-day management of a FortiAuthenticator appliance.

    Prerequisites

    • FortiGate II
    • Understanding of authentication, authorization, and accounting