Description This article discusses about the users/groups exclusion from
2FA in the FortiAuthenicator windows agent. Scope FortiAuthenicator
windows agent. Solution When excluding the users/groups on
FortiAuthenicator Windows Agent, there are conside...
Description This article describes about issue where FSSO events are not
collected by FortiGate after upgrade of FortiAuthenticator to 6.4.5.
Scope FortiAuthenticator 6.4.5 Solution Disable 'Enable encryption'
under Fortinet SSO Methods - > SSO - > G...
Description This article describes inbound proxy settings for source
address detection, Scope Solution From version 6.3.1 FortiAuthenticator
allows the administrator to specify which HTTP header(s) may or may not
be used to retrieve the source IP add...
Description This article describes how to manually download and install
FortiAuthenticator Agent for Windows. Solution 1) Log in to the
'Customer Service and Support' web portal here, and select the 'Support'
option, followed by 'Firmware Download'. ...
Description This article describes setting up a new social captive
portal service on the FortiAuthenticator, and configuring the FortiGate
for captive portal access, allowing users to log in to the WiFi network
using either SMS or e-mail self-registr...
Hi Toshi, On this link you can also see Product integration and support
of FortiOS for example:
When you want to import the users FAC should give you the list of groups
for importing the users: In this link at the end of document you can
find that info: Group Select the SAML server group to import users from.
Hi, If you created the certificate from FortiAuthneticator as server
certificate then you will need to select that one. You will also need to
upload CA certificate from FortiAuthneticator to both FortiGates then.
From the client side you will choose ...
Hi, You can find that information under release notes of FortiAnalyzer.
For example for version 7.2.1:
For version 7.0.5:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.