Please select a model

Virtual Appliances

Mezzanine Card

FortiOS Handbook

The complete guide to FortiOS.

Fortinet Cookbook

Recipes for success with Fortinet's technologies.

Inside FortiOS

Documents highlighting the features and benefits of FortiOS products.
View Inside FortiOS Documents

FortiGate-5000 and FortiGate-7000

Documents about FortiGate-5000, FortiGate-7000, and related products
View FortiGate-5000 and FortiGate-7000 Documents

FortiGate Virtualization

FortiGate and FortiOS VM/SDN/Cloud content
View FortiGate Virtualization Documents
  • preview!
preview!

User Authentication

Oct 31, 2013 188 51019

Download Document

Summary

Identifying users and other computers—authentication—is a key part of network security. Businesses need to authenticate people who have access to company resources. In the physical world this may be a swipe card to enter the building, or a code to enter a locked door. If a person has this swipe card or code, they have been authenticated as someone allowed in that building or room. Authentication is the act of confirming the identity of a person or other entity. In the context of a private computer network, the identities of users or host computers must be established to ensure that only authorized parties can access the network. The FortiGate unit enables controlled network access and applies authentication to users of security policies and VPN clients.

Products

Versions

Related Documents