The primary use cases of Fortinet FortiToken for my customers typically involve adding multi-factor authentication (MFA) for remote access. This is often required for remote workers or external providers. For instance, in industrial environments where external companies provide services, this solution helps manage secure access. Another common use case includes providing an external captive portal and self-registration.
Project Manager at Saudi Arabian Military Industries (SAMI)
Real User
Top 20
2024-06-27T13:56:32Z
Jun 27, 2024
We integrate the solution as multi factor authentication for all our security devices and VPN to protect administrative access to them. We are using the solution in the IT sector.
All customers want a more secure VPN connection. Therefore, we use FortiToken as a multi-factor authentication solution to increase connectivity security for our customers.
The platform's main use case is to facilitate authentication when connecting outside of the organization, particularly when using Fortinet VPN. It ensures secure access to our network resources, especially when working remotely.
We're using a third-party tool for second-level authentication. So, basically, we integrated our Office 365 to Active Directory for additional service, and our users need to provide the SSH people to log in. So we wanted to use that ticket, which is not scalable. So that's why it should be what we basically use FortiToken for now is to ensure that administrators who log into the box have to provide additional proof at the DCB app.
The name of the authenticator is from the user's site. It's sufficient for that to provide you with a number when you need to access a protected resource, which is the site. This is two-factor authentication. You have two layers of authentication. The first layer is provided by the name and password, and the second layer is provided by the authenticator. So you have to be attentive to that when the app prompts you, or at least the app prompts you, which advises you about the directive that someone is attempting to access this technology. And you can confirm by saying yes. It's directly linked to the internal access attempt to the site.
All users who can log in on Fortinet have Token. We have 15 FortiTokens for the managers who are connected to the VPN and also for those who are connected to the software. It is mobile, not a hard token. That said, I have the hardware token, which is related to the administrator, me, and my assistant. It's used on software and hardware. We use it at an administrator level and at a user level.
Business Delivery Technology Services Leader at FIS
Real User
2022-02-23T11:52:55Z
Feb 23, 2022
FortiToken is a second-factor authentication solution mapped to the on-prem firewall. Any user who connects to the firewall for VPN uses the token for authentication. Our client is the end-user, and we manage it for them. We acquired FortiToken five years ago and additional tokens every year since then. The token is just a piece of hardware, so there's nothing to be refreshed over there.
As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security. Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.
The primary use cases of Fortinet FortiToken for my customers typically involve adding multi-factor authentication (MFA) for remote access. This is often required for remote workers or external providers. For instance, in industrial environments where external companies provide services, this solution helps manage secure access. Another common use case includes providing an external captive portal and self-registration.
We integrate the solution as multi factor authentication for all our security devices and VPN to protect administrative access to them. We are using the solution in the IT sector.
All customers want a more secure VPN connection. Therefore, we use FortiToken as a multi-factor authentication solution to increase connectivity security for our customers.
The platform's main use case is to facilitate authentication when connecting outside of the organization, particularly when using Fortinet VPN. It ensures secure access to our network resources, especially when working remotely.
We use the product for multifactor authentication.
We're aiming to provide every user with mobile token-based two-factor authentication (2FA) to enhance security. It's for internal security.
We only use FortiToken for authentication purposes, like logging into SSL VPN or plugging into firewalls.
We're using a third-party tool for second-level authentication. So, basically, we integrated our Office 365 to Active Directory for additional service, and our users need to provide the SSH people to log in. So we wanted to use that ticket, which is not scalable. So that's why it should be what we basically use FortiToken for now is to ensure that administrators who log into the box have to provide additional proof at the DCB app.
The name of the authenticator is from the user's site. It's sufficient for that to provide you with a number when you need to access a protected resource, which is the site. This is two-factor authentication. You have two layers of authentication. The first layer is provided by the name and password, and the second layer is provided by the authenticator. So you have to be attentive to that when the app prompts you, or at least the app prompts you, which advises you about the directive that someone is attempting to access this technology. And you can confirm by saying yes. It's directly linked to the internal access attempt to the site.
I have used the solution for VPN access.
We are using Fortinet FortiToken for token-based mobile applications.
We use FortiToken to authenticate many of the applications we and our clients use. We use, integrate, and resell the solution.
All users who can log in on Fortinet have Token. We have 15 FortiTokens for the managers who are connected to the VPN and also for those who are connected to the software. It is mobile, not a hard token. That said, I have the hardware token, which is related to the administrator, me, and my assistant. It's used on software and hardware. We use it at an administrator level and at a user level.
FortiToken is a second-factor authentication solution mapped to the on-prem firewall. Any user who connects to the firewall for VPN uses the token for authentication. Our client is the end-user, and we manage it for them. We acquired FortiToken five years ago and additional tokens every year since then. The token is just a piece of hardware, so there's nothing to be refreshed over there.
We are using it for VPN. We have its latest version.