Network and Internet access is key for almost every role within the enterprise; however, this requirement must be balanced with the risk that it brings. The key objective of every enterprise is to provide secure but controlled network access enabling the right person the right access at the right time, without compromising on security.

Strengthen security with FortiAuthenticator by ensuring only the right person at the right time can access your sensitive networks and data.



FortiAuthenticator can identify users through a varied range of methods and integrate with third party LDAP or Active Directory systems to apply group or role data to the user and communicate with FortiGate for use in Identity-based policies.

As a completely flexible system, FortiAuthenticator can utilise these methods in combination. For example, in a large enterprise, AD polling or FortiAuthenticator SSO Mobility Agent may be chosen as the primary method for transparent authentication with fallback to the portal for non-domain systems or guest users.


  • Ability to transparently identify network users and enforce identity-driven policy on a Fortinet-enabled enterprise network
  • Seamless secure two-factor/OTP authentication across the organisation in conjunction with FortiToken
  • IEEE802.1X and social network-based authentication support for wired and wireless network security
  • Certificate management for enterprise wireless and VPN deployment
Strong User Identity with Multi-factor Authentication

Active Directory & LDAP authentication

Fortinet Single Sign-On is the method of providing secure identity and role-based access to the Fortinet connected network. Through integration with existing Active Directory or LDAP authentication systems, it enables enterprise user identity based security without impeding the user or generating work for network administrators.

FortiAuthenticator builds on the foundations of Fortinet Single Sign-on, adding a greater range of user identification methods and greater scalability. FortiAuthenticator is the gatekeeper of authorisation into the Fortinet secured enterprise network identifying users, querying access permissions from third-party systems and communicating this information to FortiGate devices for use in Identity-Based Policies.


FortiAuthenticator Benefits

  • Reduces operational burden of user management
  • Provides secure identity and role-based access
  • Cost-effective for businesses to carrier deployments


  • Fortinet Network Security
    FortiAuthenticator™ User Identity Management and Single Sign-On Data sheet

    View Resource >

  • Fortinet Network Security
    Identity and Access Management (IAM) Advanced Practices

    View Resource >

  • Fortinet Network Security
    What to Look for in a Cyber Security Open Ecosystem

    View Resource >

  • Fortinet Network Security
    Secure Access for Operational Technology at Scale

    View Resource >

We want to hear from you

Get in Touch

Explore the many capabilities of FortiAuthenticator – for user identification, single sign-on, and/or two-factor authentication. Learn how easy it is to scalably add these capabilities to a FortiGate deployment.

To speak to one of our trusted advisors, please leave a few contact details and our team will be in touch.

Or feel free to give us a call and speak with someone immediately.