Fortinet black logo

Admin Guide

Use Cases

Use Cases

One example would be if a customer already has a setup with an IdP and multiple SPs but they don't have 2FA. We can say that they're using Google as the IdP to provide the user source and then they might be using SSL VPN through a FortiGate to be the SP. With their current setup, if an end-user tries to login through SSL VPN, they will be directed to the Google login page and then once they input their username and password, they will immediately be let into SSL VPN. With FTC's IdP Proxy set up, what the end user will experience instead would be:

Google login > FTC 2FA OTP page > FGT SSL VPN

Use Cases

One example would be if a customer already has a setup with an IdP and multiple SPs but they don't have 2FA. We can say that they're using Google as the IdP to provide the user source and then they might be using SSL VPN through a FortiGate to be the SP. With their current setup, if an end-user tries to login through SSL VPN, they will be directed to the Google login page and then once they input their username and password, they will immediately be let into SSL VPN. With FTC's IdP Proxy set up, what the end user will experience instead would be:

Google login > FTC 2FA OTP page > FGT SSL VPN