One Token shared by different applications
Changing separate tokens to a single token
Independent token
Auto-Alias features—using the same email address
Splitting user quota among different realms
FIC account lockout (2FA)
Managing access to FIC
Controlling risky conditions
Synchronizing LDAP remote users in wildcard user group from FortiGate
Transferring devices on FIC
ZTNA HTTPS access proxy with FIC MFA
Adding FIC MFA to remote access IPsec VPN
Configuring FIC as Microsoft Entra external authentication service provider
MFA authentication context handling
Configuring FIC as the IdP proxy for FortiSASE
FortiIdentity Cloud as OIDC provider