Fortinet black logo

Control Manager

Guest or contractor log in

Copy Link
Copy Doc ID c0e495af-7299-11e9-81a4-00505692583a:57232
Download PDF

Guest or contractor log in

The portal defaults to a guest or contractor log in link which opens the default guest authentication page. To log into the network, guests and contractors must enter the required data fields on their account.

Log in procedure

Guests and contractors log in so they can access the network.

  1. From the Guest or Contractor Log in page, the guest clicks the Start link to open the Welcome screen.
  2. Guests enter the User name and the Password that was provided to them by a printout, e-mail or SMS message.
  3. Guests click Download or Register to open the Registration screen.
  4. The fields that appear in the Registration screen are those that were defined in the Guest/Contractor template. Fields with an asterisk indicate to the guest that this information must be entered in order to register.
  5. The guest clicks Acceptable Use Policy to read, accept, and exit the Acceptable Use Policy page.
  6. The guest clicks Continue button. If the machines passes the Endpoint Compliance Policy requirements, the successful landing page is displayed.
  7. If the machine does not pass the Endpoint Compliance Policy requirements, a remediation web page appears and directs the guest to correct the problems that inhibited opening his account.

Guest or contractor log in

The portal defaults to a guest or contractor log in link which opens the default guest authentication page. To log into the network, guests and contractors must enter the required data fields on their account.

Log in procedure

Guests and contractors log in so they can access the network.

  1. From the Guest or Contractor Log in page, the guest clicks the Start link to open the Welcome screen.
  2. Guests enter the User name and the Password that was provided to them by a printout, e-mail or SMS message.
  3. Guests click Download or Register to open the Registration screen.
  4. The fields that appear in the Registration screen are those that were defined in the Guest/Contractor template. Fields with an asterisk indicate to the guest that this information must be entered in order to register.
  5. The guest clicks Acceptable Use Policy to read, accept, and exit the Acceptable Use Policy page.
  6. The guest clicks Continue button. If the machines passes the Endpoint Compliance Policy requirements, the successful landing page is displayed.
  7. If the machine does not pass the Endpoint Compliance Policy requirements, a remediation web page appears and directs the guest to correct the problems that inhibited opening his account.