Scheme & Rules
The Scheme & Rules tab in Authentication displays a list of the configured authentication rules and schemes.
An authentication scheme defines the method of authentication that is applied. By default, fortipam_auth_scheme and fortipam_token_scheme authentication schemes are available.
In accordance with PAM design, you should avoid changing the default authentication schemes. |
Schemes and rules must not be configured by the customers. Schemes and rules are automatically updated when the following features are configured:
|
An authentication rule defines the proxy sources and destinations that require authentication, and which authentication scheme to apply.
For each authentication scheme, the following columns are displayed:
-
Name
-
Method
-
User database
-
Reference
For each authentication rule, the following columns are displayed:
-
Seq #
-
Name
-
Source Address
-
Authentication Scheme
-
Comments
The Schemes & Rules tab contains the following options:
+Create New |
From the dropdown, select either Authentication Rule or Authentication Scheme to create an authentication rule or authentication scheme respectively. See Creating an authentication scheme and Creating an authentication rule. |
Edit |
Select to edit the selected authentication rule or scheme. |
Delete |
Select to delete the selected authentication rules or schemes. |
Search |
Enter a search term in the search field, then hit |
Refresh |
To refresh the contents, click the refresh icon on the bottom-right. |
Use the toggle on the top-right to switch between Authentication Rules and Authentication Schemes. |
Changes to the authentication rule sequence applies to both proxy policies and ZTNA rules. |