At a minimum, which two configurations are required to enable guest portal services on FortiAuthenticator? (Choose two)
enable guest portal services on FortiAuthenticator, you need to configure a portal policy that defines the conditions for presenting the guest portal to users and the authentication methods to use. You also need to configure at least one post-login service that defines what actions to take after a user logs in successfully, such as sending an email confirmation, assigning a VLAN, or creating a user account. Configuring a RADIUS client or an external authentication portal are optional steps that depend on your network setup and requirements. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372404/guest-management
You are an administrator for a large enterprise and you want to delegate the creation and management of guest users to a group of sponsors.
How would you associate the guest accounts with individual sponsors?
Guest accounts are associated with the sponsor that creates the guest account.A sponsor is a user who has permission to create and manage guest accounts on behalf of other users3.A sponsor can create guest accounts using the sponsor portal or the REST API3.The sponsor's username is recorded as a field in the guest account's profile3.
At a minimum, which two configurations are required to enable guest portal services on FortiAuthenticator? (Choose two)
enable guest portal services on FortiAuthenticator, you need to configure a portal policy that defines the conditions for presenting the guest portal to users and the authentication methods to use. You also need to configure at least one post-login service that defines what actions to take after a user logs in successfully, such as sending an email confirmation, assigning a VLAN, or creating a user account. Configuring a RADIUS client or an external authentication portal are optional steps that depend on your network setup and requirements. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372404/guest-management
Which method is the most secure way of delivering FortiToken data once the token has been seeded?
Online activation of the tokens through the FortiGuard network is the most secure way of delivering FortiToken data once the token has been seeded because it eliminates the risk of seed files being compromised during transit or storage. The other methods involve physical or manual delivery of seed files which can be intercepted, lost, or stolen. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372403/fortitoken
When you are setting up two FortiAuthenticator devices in active-passive HA, which HA role must you select on the master FortiAuthenticator?
When you are setting up two FortiAuthenticator devices in active-passive HA, you need to select the active-passive master role on the master FortiAuthenticator device. This role means that the device will handle all requests and synchronize data with the slave device until a failover occurs. The slave device must be configured as an active-passive slave role. The other roles are used for different HA modes, such as standalone (no HA), cluster (active-active), or load balancing (active-active with load balancing). Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372411/high-availability
Latanya
7 days agoAdell
20 days agoOliva
22 days agoRossana
1 months agoTuyet
2 months agoRebecka
2 months agoMona
2 months agoYolando
3 months agoMabelle
3 months agoIrma
3 months agoSherita
3 months agoFidelia
4 months agoMozell
5 months agoCammy
6 months agoAshton
6 months agoStephania
6 months agoSabrina
7 months agoDarci
7 months agoCorrie
7 months agoLinn
9 months ago