24 Questions
What is the purpose of role-based authentication?
To assign device access based on role and restrict access for business critical devices and servers
How can role-based authentication be helpful in an O.T network?
By assigning different access for different roles to avoid security risks
What can be scheduled to allow access during a set time window in role-based authentication?
Third-party user access
Where can role-based user groups be configured and maintained?
FortiGate, FortiAuthenticator, or any remote authentication server
What do FortiGate and FortiAuthenticator rely on for authentication in server-based authentication?
A remote server
Which protocols can be used for user information in server-based authentication?
POP3, RADIUS, L-DAP, and TACACS+
What is recommended regarding separate authentication servers for O.T and I.T in server-based authentication?
Using separate authentication servers for O.T and I.T
What is the primary purpose of creating separate user groups for different roles in role-based authentication?
To allow access throughout the network based on roles
Why is it critical to come up with a strategy to assign different access for different roles in an O.T network?
To avoid any security risks
What can be used to restrict access to third-party users in role-based authentication?
Firewall policies
Which type of network requires careful creation of an access list based on roles?
O.T network
What is the purpose of using the firewall policies in role-based authentication?
To restrict access to network devices and servers
What is required to manage local authentication in a larger O.T network with FortiGate devices?
An external authentication server
When using a remote authentication server to authenticate users, who evaluates the user credentials?
The remote authentication server
How can you save FortiGate resources when dealing with a larger user list in a centralized location?
Using remote authentication
What should be done to secure the remote authentication server?
Keep it behind the most restricted firewall
What is an instruction for checking authentication in firewall policies?
Check the source of the firewall policy
What is used as part of Source criteria to match in firewall policies?
Users
What is required to restrict access to the authentication server from select devices?
Define source IP-addresses in a policy
What can FortiAuthenticator be used for in relation to remote servers?
Pull user information from remote servers
What is the purpose of using FortiAuthenticator as a remote server on FortiGate?
Configure and maintain user information
When does FortiGate check firewall policies to determine whether to accept or deny the communication session?
When the firewall receives the initial connection
What can be included in the source definition for a firewall policy to successfully authenticate users?
Local user accounts, remote server users and groups, PKI users, and FSSO users
What is the purpose of using remote authentication with FortiGate?
To create and maintain a larger user list in a centralized location
Test your knowledge of role-based authentication with this quiz. Explore how to assign device access based on user roles, create separate user groups, and configure access lists for different roles. Gain insights into scheduling third-party user access and ensuring security for business critical devices and servers.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free