Description This article discusses about the users/groups exclusion from
2FA in the FortiAuthenicator windows agent. Scope FortiAuthenicator
windows agent. Solution When excluding the users/groups on
FortiAuthenicator Windows Agent, there are conside...
Description This article describes about issue where FSSO events are not
collected by FortiGate after upgrade of FortiAuthenticator to 6.4.5.
Scope FortiAuthenticator 6.4.5 Solution Disable 'Enable encryption'
under Fortinet SSO Methods - > SSO - > G...
Description This article describes inbound proxy settings for source
address detection, Scope Solution From version 6.3.1 FortiAuthenticator
allows the administrator to specify which HTTP header(s) may or may not
be used to retrieve the source IP add...
Description This article describes how to manually download and install
FortiAuthenticator Agent for Windows. Solution Log in to the 'Customer
Service and Support' web portal here, and select the 'Support' option,
followed by 'Firmware Download'. 2. ...
Description This article describes setting up a new social captive
portal service on the FortiAuthenticator, and configuring the FortiGate
for captive portal access, allowing users to log in to the WiFi network
using either SMS or e-mail self-registr...
Hi, You are right. There is no application under config firewall
shaping-policy in Forti Proxy: FortiProxy:
Hello, The latest version of FSSO Collector Agent is 0311. You can find
that version in support portal in download section of FortiGate OS 7.2.5
and 7.4.0. You can try with upgrade and the crosscheck the situation. It
hard to guess without the logs w...
Hello, If you are using FSSO directly on the FortiGate without Collector
Agent, then all of the FortiGate's needs the same configuration to the
DC it self. If you are using the Collector Agent you can use then the
same Collector Agent for all FortiGa...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.