Architecture
The following topology highlights the network architecture of the FortiToken Cloud end-to-end solution.
The following describes the workflow of the FTC MFA authentication process:
-
The user enters their username and password which will be first sent over to the connected apps and services.
-
The apps and services will then relay the credentials to the connected Fortinet devices.
-
The Fortinet devices will then consult the connected system of records (e.g., SAML, LDAP, or RADIUS servers) to verify the credentials.
-
Upon successful verification, a FortiToken Cloud code will be sent to the user.
-
Once the user enters the code either manually or via push notification, FTC will verify the code.
-
If the code verification is successful, the Fortinet devices will be notified.
-
At this point, the authentication process is completed, and the user should be able to successfully log into their apps and services.