Podcast
Questions and Answers
What is the purpose of role-based authentication?
What is the purpose of role-based authentication?
How can role-based authentication be helpful in an O.T network?
How can role-based authentication be helpful in an O.T network?
What can be scheduled to allow access during a set time window in role-based authentication?
What can be scheduled to allow access during a set time window in role-based authentication?
Where can role-based user groups be configured and maintained?
Where can role-based user groups be configured and maintained?
Signup and view all the answers
What do FortiGate and FortiAuthenticator rely on for authentication in server-based authentication?
What do FortiGate and FortiAuthenticator rely on for authentication in server-based authentication?
Signup and view all the answers
Which protocols can be used for user information in server-based authentication?
Which protocols can be used for user information in server-based authentication?
Signup and view all the answers
What is recommended regarding separate authentication servers for O.T and I.T in server-based authentication?
What is recommended regarding separate authentication servers for O.T and I.T in server-based authentication?
Signup and view all the answers
What is the primary purpose of creating separate user groups for different roles in role-based authentication?
What is the primary purpose of creating separate user groups for different roles in role-based authentication?
Signup and view all the answers
Why is it critical to come up with a strategy to assign different access for different roles in an O.T network?
Why is it critical to come up with a strategy to assign different access for different roles in an O.T network?
Signup and view all the answers
What can be used to restrict access to third-party users in role-based authentication?
What can be used to restrict access to third-party users in role-based authentication?
Signup and view all the answers
Which type of network requires careful creation of an access list based on roles?
Which type of network requires careful creation of an access list based on roles?
Signup and view all the answers
What is the purpose of using the firewall policies in role-based authentication?
What is the purpose of using the firewall policies in role-based authentication?
Signup and view all the answers
What is required to manage local authentication in a larger O.T network with FortiGate devices?
What is required to manage local authentication in a larger O.T network with FortiGate devices?
Signup and view all the answers
When using a remote authentication server to authenticate users, who evaluates the user credentials?
When using a remote authentication server to authenticate users, who evaluates the user credentials?
Signup and view all the answers
How can you save FortiGate resources when dealing with a larger user list in a centralized location?
How can you save FortiGate resources when dealing with a larger user list in a centralized location?
Signup and view all the answers
What should be done to secure the remote authentication server?
What should be done to secure the remote authentication server?
Signup and view all the answers
What is an instruction for checking authentication in firewall policies?
What is an instruction for checking authentication in firewall policies?
Signup and view all the answers
What is used as part of Source criteria to match in firewall policies?
What is used as part of Source criteria to match in firewall policies?
Signup and view all the answers
What is required to restrict access to the authentication server from select devices?
What is required to restrict access to the authentication server from select devices?
Signup and view all the answers
What can FortiAuthenticator be used for in relation to remote servers?
What can FortiAuthenticator be used for in relation to remote servers?
Signup and view all the answers
What is the purpose of using FortiAuthenticator as a remote server on FortiGate?
What is the purpose of using FortiAuthenticator as a remote server on FortiGate?
Signup and view all the answers
When does FortiGate check firewall policies to determine whether to accept or deny the communication session?
When does FortiGate check firewall policies to determine whether to accept or deny the communication session?
Signup and view all the answers
What can be included in the source definition for a firewall policy to successfully authenticate users?
What can be included in the source definition for a firewall policy to successfully authenticate users?
Signup and view all the answers
What is the purpose of using remote authentication with FortiGate?
What is the purpose of using remote authentication with FortiGate?
Signup and view all the answers