Try our new research platform with insights from 80,000+ expert users
Network Security Engineer at a tech services company with 51-200 employees
Real User
It keeps track of users and their IPs no matter where they are in the network
Pros and Cons
  • "It keeps track of users and their IPs no matter where they are in the network. When users roam, we don't have to worry about not mapping them to an IP."
  • "Valuable features include the robust SSO features, when you have more complicated authentication within an organization. We can mix AD, Radius, Portal, SSO Portals (Google, etc.), and build our own environment. It is very flexible."
  • "The GUI is on the older side but I'm sure that it will be upgraded soon. It works, but it looks a little dated."

What is our primary use case?

We implement FortiAuthenticator in situations where there are multiple Active Directory domains. Other use cases include:

  • When we need to use FortiClient to keep track of users as they move around different locations where normal FSSO would have issues
  • When we need to use one FortiToken for multiple Fortigates
  • When we want to use it as a domain controller.

The FortiAuthenticator can do many things.

How has it helped my organization?

It keeps track of users and their IPs no matter where they are in the network. When users roam, we don't have to worry about not mapping them to an IP.

What is most valuable?

Valuable features include the robust SSO features, when you have more complicated authentication within an organization. We can mix AD, Radius, Portal, SSO Portals (Google, etc.), and build our own environment. It is very flexible.

What needs improvement?

The GUI is on the older side but I'm sure that it will be upgraded soon. It works, but it looks a little dated.

Buyer's Guide
Fortinet FortiAuthenticator
June 2025
Learn what your peers think about Fortinet FortiAuthenticator. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
859,129 professionals have used our research since 2012.

For how long have I used the solution?

One to three years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
IT System Manager at RPM INNOVATIONS, INC.
Real User
Facilitates easy integration, allowing for 2FA with our VPN. This solution enables the addition and removal of access to the VPN
Pros and Cons
  • "Fulfilled our requirement at a good price."
  • "Enables easy integration, allowing for 2FA with our VPN."
  • "Features the addition and removal of access as needed for the VPN."
  • "Integration with FortiGate could be more fluid."

What is our primary use case?

This solution is used for 2FA for Desktop and VPN access. Each computer, server and VPN access has to have a 2FA and the solution allowed us to accomplish this with a fob or phone app. We use the fob as phones are not owned by the company.

How has it helped my organization?

This was a regulation we needed to fill and it worked at a good price. It provided a solution that allowed us to fulfill the requirement.

What is most valuable?

  • Easy integration with FortiGate to allow for 2FA with our VPN.
  • Addition and removal of access as needed for the VPN.

What needs improvement?

For my use of this solution, not much needs to change. I do not mind the way it works currently. However, I would recommend a more fluid integration with FortiGate.

For how long have I used the solution?

One to three years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Fortinet FortiAuthenticator
June 2025
Learn what your peers think about Fortinet FortiAuthenticator. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
859,129 professionals have used our research since 2012.
PeerSpot user
IT Infrastructure Engineer at a tech company with 11-50 employees
Real User
It centralizes the management and storage of user identity information, thereby increasing the efficiency of administration and increasing the control over who accesses the network.

What is most valuable?

Standards-based secure authentication

FortiAuthenticator centralizes the management and storage of user identity information, thereby increasing the efficiency of administration and increasing the control over who accesses the network.

• Two-factor authentication using tokens

1- OATH-compatible time-based tokens (Hardware tokens FortiToken200/FortiToken220)
2- USB certificate-based tokens FortiToken-300)
3- FortiToken Mobile for Android, iOS, and Windows Mobile
4- SMS and email tokens

• Wired/Wireless authentication using the 802. 1X standard
• Certificate management
• Captive portal guest management
• Fortinet Single Sign-On

How has it helped my organization?

Central management of user Identities and access

FortiAuthenticator extends two-factor authentication to multiple FortiGate appliances and to third-party solutions that support RADIUS or LDAP authentication

FortiAuthenticator can create, sign, and revoke X.509 certificates.

FortiAuthenticator can sign user certificate signing requests (CSRs) and distribute certificate revocation lists (CRLs) and CA certificates.

FortiAuthenticator verifies the identity of the external LDAP server by using a trusted CA certificate

FortiAuthenticator has expanded the capabilities of captive portal from credential authentication to include social WiFi authentication and MAC address authentication.

Social WiFi authentication allows FortiAuthenticator to utilize third-party user identity methods to authenticate users into a wireless guest network. Supported authentication methods include:Google+, Facebook, LinkedIn, Twitter which include SMS- and email-based authentication

Fortinet Single Sign-on (FSSO) enables FortiAuthenticator to leverage the existing network authentication systems for firewall authentication. (Windows Active Directory (AD) or Novell eDirectory)

What needs improvement?

1- Integration with different vendor firewalls (I tested only with Cisco using Cisco ASDM 6.3 (5) but i am not sure if it works with other vendor solutions)

2- A lot of configurations are available only from CLI

3- Documentation/videos for different implementation scenarios

For how long have I used the solution?

1 year

What do I think about the stability of the solution?

It is very stable.

What do I think about the scalability of the solution?

VM platfroms are scalable based on the business needs.

How are customer service and technical support?

Customer Service:

10/10

Technical Support:

9/10

Which solution did I use previously and why did I switch?

We used FortiGate to manage tokens and user identities but FortiAuthenticater includes more features.

How was the initial setup?

All Fortinet solutions are easy to implement.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user685362 - PeerSpot reviewer
Pre-sales, Telecommunications & Security Specialist at a tech services company with 201-500 employees
Real User
It integrates very tightly with the rest of the Fortinet ecosystem. ​
Pros and Cons
  • "It integrates very tightly with the rest of the Fortinet ecosystem."
  • "A better integration with other vendors."

What is most valuable?

Integrated RADIUS server with 802.1x functionality and access control. Single Sign On and AD integration. It integrates very tightly with the rest of the Fortinet ecosystem.

How has it helped my organization?

It integrated with the existing Cisco wireless infrastructure to solidify the way people authenticate onto the network. It permitted having a centralized area to authenticate all users and enabled SSOimplementation.

What needs improvement?

A better integration with other vendors. The device is rich in features but there are a lot of functionalities I have still not experienced with.

For how long have I used the solution?

Two and a half years.

What do I think about the stability of the solution?

Overall not really, a few hiccups with the syncing with AD but nothing major.

What do I think about the scalability of the solution?

Not in my experience. The device can scale on a VM with an additional license. And there are boxes that can support thousands of users (which I have still not met).

How are customer service and technical support?

Very good. In our area we get support both in French and English and the response times are usually pretty decent.

Which solution did I use previously and why did I switch?

We are a Fortinet reseller and integrator so there were no "switches" per say.

How was the initial setup?

The setup process can be tedious.

What's my experience with pricing, setup cost, and licensing?

I would start off with a VM including the base license and scale according to the number of users you need to authenticate.

Which other solutions did I evaluate?

ClearPass by Aruba and ISE by Cisco are the two main competitors in this space. To me ClearPass seams to be the most feature-rich solution for the price and vendor neutral as is FortiAuthenticator.

What other advice do I have?

I strongly recommend someone accompany you in the initial deployment of the product to view all the functionalities that the platform is capable of doing.

Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
it_user660642 - PeerSpot reviewer
Pre-Sales Engineer at a tech services company with 11-50 employees
Real User
Some of the valuable features are user management and captive portal server.

What is most valuable?

  • User management with many credential sources: LDAPs, RADIUS, Social login, SAML, tokens, and local
  • Captive portal server: Used to configure several portals for each service
  • User friendly GUI with many features
  • Very powerful

How has it helped my organization?

We are now enjoying social login in public Wi-Fi environments with very easy deployment and a maximum level of security.

What needs improvement?

I would like to see support for more credential authentication protocols.

For how long have I used the solution?

I have used the product for six months.

What do I think about the stability of the solution?

I did not encounter any stability issues.

What do I think about the scalability of the solution?

I did not encounter any scalability issues.

How are customer service and technical support?

I would give technical support a rating of 10/10.

Which solution did I use previously and why did I switch?

We used FreeRADIUS. It had limited authentication protocols (only RADIUS), no GUI, and very complicated management.

How was the initial setup?

We enjoyed an easy deployment. There are many documents with guides and best practices.

What's my experience with pricing, setup cost, and licensing?

This solution comes with a low price for the features, power, and ease of licensing.

Which other solutions did I evaluate?

We looked at FreeRADIUS and Ciso ISE.

What other advice do I have?

This is a perfect solution for authentication services.

Disclosure: My company has a business relationship with this vendor other than being a customer: Distributor of the product.
PeerSpot user
it_user607383 - PeerSpot reviewer
Network Security Engineer at a healthcare company with 501-1,000 employees
Vendor
Helps us control security settings. Allows us to add and monitor users.

What is most valuable?

The valuable features are the granularity of the security settings and the relative ease of adding users. It also makes it really nice and easy to remove access from users that have left us or who are doing things they shouldn’t be doing.

How has it helped my organization?

It made things much easier for dealing with users BYOD for our secured wireless networks. We also use this in conjunction with an MDM solution. It makes a nice package that is easy for our end-users and is very secure.

What needs improvement?

The interface is a bit misleading in areas. Finding some settings can be a bit confusing and difficult. I would also like to see a few more real world examples given in the setup section.

For how long have I used the solution?

We have used this solution for one and a half years.

What do I think about the stability of the solution?

We did not have any stability issues. This runs on our VMware environment and we have never had an issue with stability.

What do I think about the scalability of the solution?

As this is a virtual device, we had no scalability issues. If we need more users, we just add more licenses. This makes it nice as there is no physical appliance to outgrow.

How was the initial setup?

Configuration of the virtual device was very straightforward.

The configuration of the settings in the authenticator was a bit more confusing. We did have to contact support a few times to work through some configuration issues. They also helped us set up some configurations for the active directory and our local certificate servers.

What's my experience with pricing, setup cost, and licensing?

The price was very reasonable given what it can do.  Licensing was also very reasonable.

Just make sure you do an accurate count of what you will need for licenses. If you run out of licenses, no additional users will be able to authenticate through this device.

What other advice do I have?

Planning is the key to a successful implementation. Know what you want to accomplish out of the gate before you get started. Make sure you test before rolling out to end users. Due to really tight timelines, we missed a couple of key settings and configurations.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user589359 - PeerSpot reviewer
Senior Consultant at a tech company with 1,001-5,000 employees
MSP
It has its own hardware and software token for two-factor authentication. Some of the settings are difficult to access.

What is most valuable?

One of the most valuable features is the simple FSSO (Fortinet Single Sign-On) configuration that helps to manage user-based security rules.

It is a cool security product. It's easy to use, implement and maintain, but there is room for improvement.

How has it helped my organization?

When we came across access management, we required several technical features to help manage user access to critical systems and remote access. That’s why we always go for a SSO two-factor authentication server. FortiAuthenticator is a bundle of these features. It has its own hardware and software token for two-factor authentication. It supports single sign-on and seamless integration with user-based web filtering, without any prior authentication. It can act as a Radius server to support other systems for Radius authentication. One of the common practices is using FortiAuthenticator with Dot1.X network access control.

What needs improvement?

The GUI is not fancy enough and some of the settings are difficult to access.

Part of the configuration has to be done by CLI, which is not friendly for security administrators.

Integration with other firewalls may not be as good as expected.

For how long have I used the solution?

I have used it for two years, mostly implementation for clients.

What do I think about the stability of the solution?

No stability issues so far, as long as the number of users is not too large.

What do I think about the scalability of the solution?

No issues for scalability: It is easy to add new resources as we deploy virtual machines.

How are customer service and technical support?

FortiCare can provide prompt replies. They have basic knowledge on every single product in the Fortinet family. They have a standard protocol to response to support cases which is great. They are willing to accept RMA for technical difficulties that cannot be solved in a short period of time.

Which solution did I use previously and why did I switch?

I have tried Cisco ISE as a NAC solution. Cisco ISE is the "Terminator" of NAC solutions, which has numerous features to prevent unauthorized access. However, its integration with FortiGate firewall is not great. When I use the SSLVPN service from FortiGate, it fails to authenticate with two-factor authentication. For this, using FortiAnthenticator would be a good choice for its genuine integration.

What about the implementation team?

It is quite straightforward to set up the FortiAuthenticator. We mainly deploy as a virtual machine. An OVF file is provided by Fortinet and you just simply compile the file in the VMware environment. Upon simple configuration, such as IP address and default gateway, you can access the web GUI and do any configuration, as you like.

What's my experience with pricing, setup cost, and licensing?

Licensing is straightforward, as Fortinet provides stackable licenses for FortiAuthenicator. Count the number of users and select sufficient licenses. Pricing is acceptable; much cheaper than Cisco ISE.

Which other solutions did I evaluate?

I have tried Cisco ISE. For state-of-the-art features, I would recommend Cisco ISE because of its brilliant features. But I would recommend FortiAuthenticator, if you are currently using FortiGate firewall and you seek a well-suited, complimentary NAC solution.

What other advice do I have?

The need for a NAC solution depends on your infrastructure. If you are a Fortinet user, FortiAuthenticator would be a nice choice to enhance security on VPN and web access. However, there are many other choices, such as ForeScout, which is vendor-neutral, to support different systems from different vendors.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Senior IT Support Engineer at a marketing services firm with 501-1,000 employees
Vendor
Provides two-factor authentication and integration with our other FortiGates.

What is most valuable?

The valuable features are:

  • Two-factor authentication
  • User ID with our LDAP service
  • Integration with our other FortiGates

How has it helped my organization?

By using one of our units as a load-balancing slave, we were able to roll out location-based VPNs that created quicker connections to local servers for our end users. Furthermore, incorporating a LBS unit has provided preventative measures and ensured that our remote users can still connect if a failure occurs on our master authentication unit.

What needs improvement?

It was initially difficult to sync our high availability, load-balancing slave (LBS) to our master unit. There were some initial issues connecting it and syncing with our master FortiAuthenticator unit. After reaching out to Fortinet support, it turned out that the unit needed a software update.

I would like to see the following:

  • Creating an easier implementation of software patches.
  • Designing the admin profiles to sync across, instead of having to recreate them. (I see how this could be problematic with security measures.)

For how long have I used the solution?

We've been using our master unit for about a year and our LBS for about six months.

What do I think about the stability of the solution?

We had some stability issues. Our first LBS unit wouldn't work properly the first time and that wasted a lot of time. Eventually, it died and we had to RMA the unit.

What do I think about the scalability of the solution?

We didn't have any issues with scalability.

How are customer service and technical support?

The technical support we received from Fortinet was responsive. When we experienced problems, they were able to fix our issues.

Which solution did I use previously and why did I switch?

Before implementing our FortiAuthenticators, we used our main FortiGate as a way to push out two-factor codes to our users. After a while, this option was not working. As we continued to grow, we needed something more substantial and manageable.

How was the initial setup?

The initial setup was somewhat difficult in syncing our LDAP service to our main FortiGate.

Which other solutions did I evaluate?

Before using the FortiAuthenticator, we pushed out tokens via our main FortiGate.

What other advice do I have?

If you want a more efficient way to manage two-factor authentication for your users, or implement the unit as a cluster member role, the FortiAuthenticator can be incorporated very well into your environment.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Fortinet FortiAuthenticator Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Fortinet FortiAuthenticator Report and get advice and tips from experienced pros sharing their opinions.