Fortinet FortiAuthenticator and Microsoft Active Directory are two prominent identity management solutions. Fortinet FortiAuthenticator stands out for its pricing and customer support, whereas Microsoft Active Directory is preferred for its feature set and deployment ease.
Features: Fortinet FortiAuthenticator is valued for its high security, integration with Fortinet products, and flexibility. Microsoft Active Directory is praised for its comprehensive directory services, scalability, and integration with a wide range of applications. Users tend to find Microsoft Active Directory more robust in feature set.
Room for Improvement: Fortinet FortiAuthenticator users suggest improvements in documentation and reporting capabilities. Microsoft Active Directory users highlight the need for a more modern approach to identity management and better cloud integration. Fortinet FortiAuthenticator has more room for improvement in usability, whereas Microsoft Active Directory needs advancements in versatility.
Ease of Deployment and Customer Service: Fortinet FortiAuthenticator receives positive feedback for straightforward deployment and responsive customer service. Microsoft Active Directory, while also easy to deploy, can be complex in large-scale environments. Fortinet FortiAuthenticator offers a more user-friendly deployment experience and better customer service support.
Pricing and ROI: Fortinet FortiAuthenticator is favored for its competitive pricing and quick ROI. Microsoft Active Directory, though considered more expensive, is seen as offering greater value due to its extensive features and capabilities. Fortinet FortiAuthenticator is seen as a cost-effective solution, while Microsoft Active Directory is perceived as worth the investment for its comprehensive services.
The solution is really time-saving since I don't need to create users in each server or system manually, and user access control is streamlined.
At times, some technical staff lack knowledge, which delays issue resolution.
When we send a ticket to Fortinet, they go into research mode as if they are hearing the problem for the first time.
Support documents are available on the internet in every language.
Sometimes support takes long to engage and resolve, extending over weeks or even months.
The scalability of FortiAuthenticator is good, and I would rate it an eight on a scale of one to ten.
With multiple domain controllers, stability is ensured.
For example, authentication for wireless users expires after 24 hours, requiring re-authentication daily.
The technical support could be improved as some staff lacks the necessary knowledge to assist effectively.
I would like to see more integration and inclusion of features for ransomware protection directly within the FortiAuthenticator without requiring additional devices.
Exporting and verifying group memberships require command line scripts, which isn't simple.
There are some features that need improvements in terms of ease of use and frequency of updates.
AI is offering solutions.
We use multi-factor authentication for enhancing security.
The most valuable feature I find in FortiAuthenticator is web filtering.
I can control all the devices in my domain by just changing the group policies in one place.
One valuable feature is the centralized creation of IDs.
Having active deployment and well-configured systems helps me manage tasks and easily oversee thousands of users.
Fortinet FortiAuthenticator is the primary secure point of approved access into the Fortinet network, authorizing users, reviewing access permissions, and relaying the information to all Fortigate devices for comparison with identity-based protocols. Fortinet FortiAuthenticator is a top-ranked authorization and SSO solution.
Appropriate secure access is fundamental to every role in an enterprise ecosystem. It is an integral function of every organization to ensure that every access and privilege is secure and to mitigate any possible risk to an organization. Approved users should only have access to the necessary information when they need it, from the appropriate location(s) to safeguard an organization's security at all times.
Fortinet FortiAuthenticator is available as an appliance, virtual machine, or in the cloud.
Fortinet FortiAuthenticator Methods
Reviews from Real Users
Ernesto C., Presales Engineer at a comms service provider, shares,
”Key Features and Benefits
Ibrahim M., Senior Network & Security Engineer at a tech services company, relates, "The initial setup is a valuable point on Fortinet products. Most of the time, putting the theory into practice on the devices is quite friendly and straightforward. As long as you can read English you can find your way around the solution and make it work. This is a high value point on Fortinet - the way everything is laid out in the web UI is user-friendly and quite straightforward. The UI is quite simple."
Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information.
This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts.
Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
We monitor all Single Sign-On (SSO) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.