FortiAuthenticator & FortiToken

This session is designed to demonstrate how Fortinet’s IAM solution provides a centrally managed user identity and access management with single sign-on (SSO) and multi-factor authentication. Fortinet’s IAM solution is comprised of FortiAuthenticator, FortiToken and FortiToken Cloud. The combination of FortiAuthenticator and FortiToken or FortiToken Cloud effectively addresses the identity and access management challenges organizations face in this era of rapidly increasing user and device connectivity.

During this session, we will demonstrate:

  • How FortiAuthenticator provides centralized user identity management by providing Identity Provider (IdP) proxy with Okta;
  • How FortiAuthenticator provides single sign-on (SSO);
  • How FortiToken Cloud provides multi-factor authentication, by using Adaptive authentication first and elevate to 2nd factor authentication when the user is not in a trusted network.


Zero Trust Network Access

We will demonstrate how Fortinet’s ZTNA solution provide remote access utilizing secure automatic tunnels per application session.

Fortinet’s ZTNA solution comprises FortiGate as the access proxy and FortiClient as the ZTNA agent. Fortinet’s ZTNA solution securely connects users to the application while enforcing the least privileged access.

During this session, we will cover:

  • ZTNA configuration aspects on FortiClient EMS and FortiGate;
  • Simple, automatic secure remote access that verifies who and what is on your network and secures application access no matter where users are located;
  • TCP Forwarding use cases



During this session, we will demonstrate how Fortinet’s FortiNAC solution provides complete, end-to-end visibility and enforceable controls.

Through simple Device Profiling capabilities we will show you how to dynamically detect, identify and apply network policy to allocate Printers, Cameras, IP Phones to the right network segment, with the proper port based configuration parameters dynamically assigned. 

During this session, we will:

  • Demonstrate how to perform a network discovery while leveraging secure mechanisms;
  • Create and leverage Device Profiling mechanisms to identify and classify new devices connecting to the network;
  • Demonstrate how Notifications and Alerts build confidence with customers;
  • Cover use-cases involving the assignment of network access policy based on identity, regardless of device;
  • Demonstrate how Policy and User/Host based information can be leveraged to isolate unknown devices, quarantine security risk hosts and assert role based access policy for known assets/users.