Business Development Manager at a retailer with 1-10 employees
Real User
Top 20
2024-10-03T14:47:00Z
Oct 3, 2024
FortiAuthenticator should integrate with other applications. I currently use Google Authenticator and Office Authenticator, and it would be better if FortiAuthenticator could be added to other applications.
I think the tool could provide this solution on the cloud. It's currently an on-premises solution. A cloud-based version could make setup, installation, and management easier. With on-premises, you must pay capital expenses (CapEx) upfront. However, if the solution was cloud-based, it would be operational expenses (OpEx), which is often easier to manage. You can pay monthly instead of paying the total cost at once. In my opinion, OpEx is more easily manageable than CapEx.
The solution's command line interface could be improved to provide better support for low-level debugging and advanced configurations. Additionally, features that streamline user management and integration with other Fortinet products would be advantageous.
One thing I dislike is that if you have the software authenticator on a mobile device and that device is lost, it's difficult to remove. If you have the FortiAuthenticator client installed on your mobile phone, and then you lose your phone, or the person leaves the company without uninstalling it, transferring that authenticator to another person is a bit tough. It takes a long time, it is not immediate. Sometimes more than three days, because they say it's not a priority. That's one thing I think they need to improve.
The security space is changing. The product must provide passwordless and seamless connectivity. If a particular user is identified automatically, they should not be authenticated repeatedly with tokens. It should be seamless. It could be a physical device, hardware, or some digital identity. Once the user logs in, they must be able to connect seamlessly. The integration with third-party tools must be better.
Learn what your peers think about Fortinet FortiAuthenticator. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Fortinet FortiAuthenticator provides only authentication. It should also enable authorization services. There could be a central management point for both the services similar to Cisco and Clear Pass.
The only issue I encounter is that when not using FortiAuthenticator for an extended period, it's typical to encounter some obstacles in the configuration process that you need to address. It's not a consistent problem, and I can't recall all the specifics. This issue is something I face with the entire product. While it's normal for products to require ongoing attention, this can be a challenge when checking the system.
Sr Network Security Engineer at a tech services company with 501-1,000 employees
Real User
Top 10
2023-09-13T16:32:37Z
Sep 13, 2023
There is a room for improvement. The log is a bit difficult to access, and searching the log codes is also a bit difficult. So it would be much better if, when we open a log, it could provide detailed information about errors, reasons for failure, and such.
There are some minor things that could enhance the overall experience. Maybe enhancing user integration with other solution tools to implement multifactor authentication using virtual authentication. Another area of improvement is stability and support.
Documentation is an area where Fortinet is constantly trying to improve. For improvement, Fortinet needs to ensure that they provide quick support to users. Once a ticket gets created by our company with the support team, we have to wait for SLA, which can go up to four or sometimes six hours. Fortinet sometimes needs to respond to users facing issues within an hour. Fortinet needs to improve the part of engineering SLAs. Automation is a feature I would like to see in the solution since Fortinet has included automation features only in FortiGate. It would be better to see automation features, like backup, interfaces, or statuses, in FortiAuthenticator.
The GUI has some shortcomings and can be made better. The GUI is not great. For the next release, the thing that will be most useful is to integrate with other MFA providers.
Network engineers at a government with 501-1,000 employees
Real User
2022-09-13T11:22:51Z
Sep 13, 2022
I would like to see more security features in reference to identity login or identity identification. I would like to see a troubleshooting option. For troubleshooting or viewing the lock of the device set or separate the locks from the connected device. Maybe with any device connected to the Fortinet FortiAuthenticator. And then I need the parsing device and type of locks of this device.
Co-Founder - Innovation & Education Manager at Global Seis S.A.S
Real User
2022-07-12T05:28:57Z
Jul 12, 2022
I'd like to see a simplified two-factor authentication process and some additional security around the function of geolocation. If you can't authenticate to protect transactions, and the security is weak, it's a problem.
The speed of deployment on the cloud could be improved. It took a few days when it should have been just two days. In the next release, I would like to see compatibility with non-Android and non-Apple platforms.
Presales Engineer at a comms service provider with 5,001-10,000 employees
Real User
2021-02-22T23:11:00Z
Feb 22, 2021
I would like to see integration and customization capabilities with the end-user portal to solve authentication issues with diverse implementation scenarios. Specifically, with web applications, enterprise networks, and VPN.
I'd say that the integration with some other enterprise applications could be improved. For instance, ADFS. FortiAuthenticator does not work natively with ADFS and the company is not looking in that direction. It's one of our in-house applications and it was a challenge integrating with FortiAuthenticator. We had to write a separate, customized adapter for ADFS before we could make it work. We tried to get Fortinet to work on it but I don't think their development team is interested. It's not in their plan. The other challenge was when I integrated with I think VMware - there was an issue between the radio adapter and FortiAuthenticator. Both parties were not ready to work together and the implementation was buggy. I believe this solution can be adapted to so many things, depending on the technical side and the implementation engineers. I'd like to see some additional use cases that can be infused into the solution, such as ADFS.
Senior Network & Security Engineer at a tech services company with 11-50 employees
MSP
2021-01-29T15:19:00Z
Jan 29, 2021
So far there hasn't been any major feature that we wished for and didn't find, but I would say in regards to bugs, sometimes we face unexpected issues that delay the implementation a little. However, I believe Fortinet will sort this out soon. Hopefully the solution will be more stable overall. In terms of what additional features we would like to see in the next release, we would to see support for more of the common operating systems. They already support Windows OS, with the use of an agent installed on the windows machine. However, we would like to see support for Linux-based operating systems for example. This is a shortcoming that I have faced a few times already. Also a nice addition would be agents for End-user Machines especially Windows OS & MAC OS.
IT Manager at a tech services company with 11-50 employees
Real User
2020-12-07T23:03:53Z
Dec 7, 2020
Although two-factor authentication has come a long way, there are a lot of companies that are going further. The reason for this is because people are finding ways to compromise traditional, web-based solutions. I would like to see more ways to authenticate, such as adding facial recognition to the two-factor, where you log into your phone or another device. That would be great.
Information Technology Manager at a tech services company with 51-200 employees
Real User
2020-09-23T06:10:03Z
Sep 23, 2020
For us, the solution works quite well. I can't think of an area where improvements are needed. I haven't worked with it too extensively yet, so it's hard to gauge what's lacking. The solution could be more automated. It should be able to let me automate a lot of things so that what normally is done as a matter of manual processes can be handled quicker. Slow integrations can be taken up/out if there was more automation.
Manager at a financial services firm with 501-1,000 employees
Real User
2020-08-16T08:00:17Z
Aug 16, 2020
There is nothing that really stands out as something that needs desperately to be added or improved. We are using Fortinet all the time, we know their GUIs, so we can manage well with FortiAuthenticator also. The main problem now is not exactly with the product itself. We are using FortiAnalyzers. But when we use that product with FortiAuthenicators, we can not use SQL language to access data from the FortiAnalyzers database. When we use it with FortiGate, we can query the FortiAnalyzers database, but it is not possible to do it directly with the FortiAuthenicators. This integration should be better.
It does the job I paid for, but the graphical interface could be improved. If we take FortiGate or Fortinet, the graphical user interface is better designed. I think they can work on this. It would be good to remove the FortiAuthenticator or to combine FortiAuthenticator and Fortinet. That would provide a single platform that can manage network access and user management. It doesn't make sense for me to sell FortiAuthenticator to a customer and then sell them Fortinet as well. I think they should just combine them into one solution.
There aren't any major features that I think should be improved. I like this product. As a multifactor authentication, we have the SAML function. If you compare it with RSA or Gemalto, it does a good job. I'm able to perform multifactor authentication in different ways via emails, SMS, it's a great product. For someone concerned with multifactor authentication, I'm satisfied with the product. There aren't any major additional features they could include in the next release but the one thing they used to include was the SMS gateway from the ISP. Fortinet used to sell that but they don't anymore and I think it would be helpful for end-users if they brought it back. I would recommend that. People are asking for it because they don't like having to rent it from their mobile provider.
I've only been using the solution for one month, so I haven't come across any glaring issues so far. The hardware aspect of the solution could be improved. We are not really able to understand the hardware capabilities of the device.
If you want some other FortiAuthenticator from one site to another site, you should have requirements, but really if you have authentication and directory or another solution, you should change the password of the authenticator between the solution and the directory and other things. So the transfer of data and other information should be simpler. In the future, I think h02.exe is very important to authenticate users internally. To economically move the person from vnom to vnom. Also, the ESO to ensure the authentication of users should be a bit more automated.
Director - Global Solutions & Customer Service at Brits & Byte IT Consulting
Real User
2019-06-04T07:43:00Z
Jun 4, 2019
They need to have some kind of write-up and solution document that people can access very easily. All of the Cisco documentation is available on their website and in other places. They should make it available to the public. The more people know about this product, the better. That will make it easier for them to position FortiAuthenticator to their customers or use the product in production. Other features that would improve the product are a single sign-on where people can use their Gmail ID to log-in, etc. This feature we wanted and now they are rethinking it. At this stage, I can't give any other suggestions for improvement other than this. A single sign-on is used to create a user ID and password for the user to get onto the network. You can ask them to use their LinkedIn credentials or maybe Gmail, some of the social networking credentials to gain access. This is useful when you are onboarding any guest users for internet access. This is something that is a very good feature which they could have integrated already.
Fortinet FortiAuthenticator is the primary secure point of approved access into the Fortinet network, authorizing users, reviewing access permissions, and relaying the information to all Fortigate devices for comparison with identity-based protocols. Fortinet FortiAuthenticator is a top-ranked authorization and SSO solution. Appropriate secure access is fundamental to every role in an enterprise ecosystem. It is an integral function of every organization to ensure that every access and...
FortiAuthenticator should integrate with other applications. I currently use Google Authenticator and Office Authenticator, and it would be better if FortiAuthenticator could be added to other applications.
I think the tool could provide this solution on the cloud. It's currently an on-premises solution. A cloud-based version could make setup, installation, and management easier. With on-premises, you must pay capital expenses (CapEx) upfront. However, if the solution was cloud-based, it would be operational expenses (OpEx), which is often easier to manage. You can pay monthly instead of paying the total cost at once. In my opinion, OpEx is more easily manageable than CapEx.
The solution's command line interface could be improved to provide better support for low-level debugging and advanced configurations. Additionally, features that streamline user management and integration with other Fortinet products would be advantageous.
One thing I dislike is that if you have the software authenticator on a mobile device and that device is lost, it's difficult to remove. If you have the FortiAuthenticator client installed on your mobile phone, and then you lose your phone, or the person leaves the company without uninstalling it, transferring that authenticator to another person is a bit tough. It takes a long time, it is not immediate. Sometimes more than three days, because they say it's not a priority. That's one thing I think they need to improve.
The security space is changing. The product must provide passwordless and seamless connectivity. If a particular user is identified automatically, they should not be authenticated repeatedly with tokens. It should be seamless. It could be a physical device, hardware, or some digital identity. Once the user logs in, they must be able to connect seamlessly. The integration with third-party tools must be better.
Fortinet FortiAuthenticator's initial setup process could be easier.
Fortinet FortiAuthenticator provides only authentication. It should also enable authorization services. There could be a central management point for both the services similar to Cisco and Clear Pass.
The only issue I encounter is that when not using FortiAuthenticator for an extended period, it's typical to encounter some obstacles in the configuration process that you need to address. It's not a consistent problem, and I can't recall all the specifics. This issue is something I face with the entire product. While it's normal for products to require ongoing attention, this can be a challenge when checking the system.
There is a room for improvement. The log is a bit difficult to access, and searching the log codes is also a bit difficult. So it would be much better if, when we open a log, it could provide detailed information about errors, reasons for failure, and such.
There are some minor things that could enhance the overall experience. Maybe enhancing user integration with other solution tools to implement multifactor authentication using virtual authentication. Another area of improvement is stability and support.
Documentation is an area where Fortinet is constantly trying to improve. For improvement, Fortinet needs to ensure that they provide quick support to users. Once a ticket gets created by our company with the support team, we have to wait for SLA, which can go up to four or sometimes six hours. Fortinet sometimes needs to respond to users facing issues within an hour. Fortinet needs to improve the part of engineering SLAs. Automation is a feature I would like to see in the solution since Fortinet has included automation features only in FortiGate. It would be better to see automation features, like backup, interfaces, or statuses, in FortiAuthenticator.
The GUI has some shortcomings and can be made better. The GUI is not great. For the next release, the thing that will be most useful is to integrate with other MFA providers.
It would be helpful to receive a code by yourself for authentication instead of it registered to a phone.
We had issues trying to integrate the keys properly during the initial setup.
I would like to see more security features in reference to identity login or identity identification. I would like to see a troubleshooting option. For troubleshooting or viewing the lock of the device set or separate the locks from the connected device. Maybe with any device connected to the Fortinet FortiAuthenticator. And then I need the parsing device and type of locks of this device.
The integration with other products, for example, some SAML authentications, would make it more flexible.
I'd like to see a simplified two-factor authentication process and some additional security around the function of geolocation. If you can't authenticate to protect transactions, and the security is weak, it's a problem.
FortiAuthenticator's interface could be better.
The speed of deployment on the cloud could be improved. It took a few days when it should have been just two days. In the next release, I would like to see compatibility with non-Android and non-Apple platforms.
There are some protocols, such as SHA and SHA-2, that are not supported. This is something that Fortinet is working on.
There are multiple areas that are in need of improvement. It is not a mature product. It is difficult to successfully configure.
The only way the solution could be improved is if it were cheaper.
I would like to see integration and customization capabilities with the end-user portal to solve authentication issues with diverse implementation scenarios. Specifically, with web applications, enterprise networks, and VPN.
I'd say that the integration with some other enterprise applications could be improved. For instance, ADFS. FortiAuthenticator does not work natively with ADFS and the company is not looking in that direction. It's one of our in-house applications and it was a challenge integrating with FortiAuthenticator. We had to write a separate, customized adapter for ADFS before we could make it work. We tried to get Fortinet to work on it but I don't think their development team is interested. It's not in their plan. The other challenge was when I integrated with I think VMware - there was an issue between the radio adapter and FortiAuthenticator. Both parties were not ready to work together and the implementation was buggy. I believe this solution can be adapted to so many things, depending on the technical side and the implementation engineers. I'd like to see some additional use cases that can be infused into the solution, such as ADFS.
So far there hasn't been any major feature that we wished for and didn't find, but I would say in regards to bugs, sometimes we face unexpected issues that delay the implementation a little. However, I believe Fortinet will sort this out soon. Hopefully the solution will be more stable overall. In terms of what additional features we would like to see in the next release, we would to see support for more of the common operating systems. They already support Windows OS, with the use of an agent installed on the windows machine. However, we would like to see support for Linux-based operating systems for example. This is a shortcoming that I have faced a few times already. Also a nice addition would be agents for End-user Machines especially Windows OS & MAC OS.
Although two-factor authentication has come a long way, there are a lot of companies that are going further. The reason for this is because people are finding ways to compromise traditional, web-based solutions. I would like to see more ways to authenticate, such as adding facial recognition to the two-factor, where you log into your phone or another device. That would be great.
For us, the solution works quite well. I can't think of an area where improvements are needed. I haven't worked with it too extensively yet, so it's hard to gauge what's lacking. The solution could be more automated. It should be able to let me automate a lot of things so that what normally is done as a matter of manual processes can be handled quicker. Slow integrations can be taken up/out if there was more automation.
There is nothing that really stands out as something that needs desperately to be added or improved. We are using Fortinet all the time, we know their GUIs, so we can manage well with FortiAuthenticator also. The main problem now is not exactly with the product itself. We are using FortiAnalyzers. But when we use that product with FortiAuthenicators, we can not use SQL language to access data from the FortiAnalyzers database. When we use it with FortiGate, we can query the FortiAnalyzers database, but it is not possible to do it directly with the FortiAuthenicators. This integration should be better.
It does the job I paid for, but the graphical interface could be improved. If we take FortiGate or Fortinet, the graphical user interface is better designed. I think they can work on this. It would be good to remove the FortiAuthenticator or to combine FortiAuthenticator and Fortinet. That would provide a single platform that can manage network access and user management. It doesn't make sense for me to sell FortiAuthenticator to a customer and then sell them Fortinet as well. I think they should just combine them into one solution.
There aren't any major features that I think should be improved. I like this product. As a multifactor authentication, we have the SAML function. If you compare it with RSA or Gemalto, it does a good job. I'm able to perform multifactor authentication in different ways via emails, SMS, it's a great product. For someone concerned with multifactor authentication, I'm satisfied with the product. There aren't any major additional features they could include in the next release but the one thing they used to include was the SMS gateway from the ISP. Fortinet used to sell that but they don't anymore and I think it would be helpful for end-users if they brought it back. I would recommend that. People are asking for it because they don't like having to rent it from their mobile provider.
We have issues with HA (high availability). These should be addressed in future releases.
I've only been using the solution for one month, so I haven't come across any glaring issues so far. The hardware aspect of the solution could be improved. We are not really able to understand the hardware capabilities of the device.
I don't have any issues with this solution, but it may need a better, more user-friendly interface or better design of the platform.
If you want some other FortiAuthenticator from one site to another site, you should have requirements, but really if you have authentication and directory or another solution, you should change the password of the authenticator between the solution and the directory and other things. So the transfer of data and other information should be simpler. In the future, I think h02.exe is very important to authenticate users internally. To economically move the person from vnom to vnom. Also, the ESO to ensure the authentication of users should be a bit more automated.
They need to have some kind of write-up and solution document that people can access very easily. All of the Cisco documentation is available on their website and in other places. They should make it available to the public. The more people know about this product, the better. That will make it easier for them to position FortiAuthenticator to their customers or use the product in production. Other features that would improve the product are a single sign-on where people can use their Gmail ID to log-in, etc. This feature we wanted and now they are rethinking it. At this stage, I can't give any other suggestions for improvement other than this. A single sign-on is used to create a user ID and password for the user to get onto the network. You can ask them to use their LinkedIn credentials or maybe Gmail, some of the social networking credentials to gain access. This is useful when you are onboarding any guest users for internet access. This is something that is a very good feature which they could have integrated already.