In this video we will show you how to setup your FortiAuthenticator for the first time and configure a basic single sign-on environment. This tutorial includes information on: remote LDAP using Active Directory, FSSO with a FortiGate, single sign-on using DC polling, and the FortiClient Single Sign-on Mobility Agent.
0
You also might be interested in
Learn more: Ponemon recently came out with a study where they interviewed more than 2,200 IT and Security professionals that had experienced data breach. What they concluded was 48% are due to malicious or criminal attack. In this video, learn how FortiAnalyzer can help address this root cause and protect…
Read the news release: Find out more: See Fortinet’s greatest milestones over the last 20 years: For more information about Fortinet: Read our blog: Fortinet has announced it will be a PGA TOUR title sponsor for the Fortinet Championship tournament in Napa Valley taking place in September 2021. Watch to…
IT Solutions & Resources
- AI & Cognitive Services (31)
- Analytics (1)
- Business (211)
- Cisco (743)
- Collaboration (37)
- Communication (38)
- Cyber Security (307)
- Data Center & Cloud (61)
- Defendify (54)
- Enterprise Networks (211)
- Events (4)
- FAQ (2)
- Firewall (51)
- Fortinet (330)
- Governance (26)
- Microsoft Cloud (20)
- Microsoft Office 365 (65)
- News (7)
- Podcasts (5)
- Uncategorized (536)
- Unified Communications (19)
- Updates (3)
- Video (1,112)
Recent IT & Cyber Security News
- Beers with Peers Event 5/12/22 @ Raised Grain Brewing – Wisconsin Act 73 Data Security Requirements April 17, 2022
- Which is the better fit for you? The Alternative Clouds or Hyperscale Clouds? April 6, 2022
- F.B.a.a.S – Free Beer as a Service February 3, 2022
- Snort 3 and Me: The Rule Writers Speak October 8, 2021
IT and Security Reference
AI
analytics
antivirus
camera phone
cisco
Cisco IT
Cloud
cloud security
Collaboration
cyber
cyberattack
cybercrime
cybercriminal
cybersecurity
cyberthreat
data center
endpoint
firewall
FortiGate
Fortinet
FortiOS
free
hybrid cloud
information technology
IoT
IT
malware
Microsoft
mobile security
network
networking
network security
NGFW
Office 365
Private Cloud
public cloud
ransomware
sd-wan
security
Security Fabric
sharing
Technology
upload
video
video phone