Fortinet black logo

Administration Guide

Scheme & Rules

Scheme & Rules

The Scheme & Rules tab in Authentication displays a list of the configured authentication rules and schemes.

An authentication scheme defines the method of authentication that is applied. By default, fortipam_auth_scheme and fortipam_token_scheme authentication schemes are available.

In accordance with PAM design, you should avoid changing the default authentication schemes.

Schemes and rules must not be configured by the customers.

Schemes and rules are automatically updated when the following features are configured:

  • API users

  • LDAP server and users

  • RADIUS server and users

  • SAML server and users

An authentication rule defines the proxy sources and destinations that require authentication, and which authentication scheme to apply.

For each authentication scheme, the following columns are displayed:

  • Name

  • Method

  • User database

  • Reference

For each authentication rule, the following columns are displayed:

  • Seq #

  • Name

  • Source Address

  • Authentication Scheme

  • Comments

The Schemes & Rules tab contains the following options:

+Create New

From the dropdown, select either Authentication Rule or Authentication Scheme to create an authentication rule or authentication scheme respectively. See Creating an authentication scheme and Creating an authentication rule.

Edit

Select to edit the selected authentication rule or scheme.

Delete

Select to delete the selected authentication rules or schemes.

Search

Enter a search term in the search field, then hit Enter to search. To narrow down your search, see Column filter.

Refresh

To refresh the contents, click the refresh icon on the bottom-right.

Use the toggle on the top-right to switch between Authentication Rules and Authentication Schemes.

Changes to the authentication rule sequence applies to both proxy policies and ZTNA rules.

Scheme & Rules

The Scheme & Rules tab in Authentication displays a list of the configured authentication rules and schemes.

An authentication scheme defines the method of authentication that is applied. By default, fortipam_auth_scheme and fortipam_token_scheme authentication schemes are available.

In accordance with PAM design, you should avoid changing the default authentication schemes.

Schemes and rules must not be configured by the customers.

Schemes and rules are automatically updated when the following features are configured:

  • API users

  • LDAP server and users

  • RADIUS server and users

  • SAML server and users

An authentication rule defines the proxy sources and destinations that require authentication, and which authentication scheme to apply.

For each authentication scheme, the following columns are displayed:

  • Name

  • Method

  • User database

  • Reference

For each authentication rule, the following columns are displayed:

  • Seq #

  • Name

  • Source Address

  • Authentication Scheme

  • Comments

The Schemes & Rules tab contains the following options:

+Create New

From the dropdown, select either Authentication Rule or Authentication Scheme to create an authentication rule or authentication scheme respectively. See Creating an authentication scheme and Creating an authentication rule.

Edit

Select to edit the selected authentication rule or scheme.

Delete

Select to delete the selected authentication rules or schemes.

Search

Enter a search term in the search field, then hit Enter to search. To narrow down your search, see Column filter.

Refresh

To refresh the contents, click the refresh icon on the bottom-right.

Use the toggle on the top-right to switch between Authentication Rules and Authentication Schemes.

Changes to the authentication rule sequence applies to both proxy policies and ZTNA rules.