A system administrator wants to integrate FortiAuthenticator with an existing identity management system with the goal of authenticating and deauthenticating users into FSSO.
What feature does FortiAuthenticator offer for this type of integration?
An administrator wants to keep local CA cryptographic keys stored in a central location.
Which FortiAuthenticator feature would provide this functionality?
Which EAP method is known as the outer authentication method?
You are the administrator of a large network that includes a large local user datadabase on the current Fortiauthenticatior. You want to import all the local users into a new Fortiauthenticator device.
Which method should you use to migrate the local users?
Which behaviors exist for certificate revocation lists (CRLs) on FortiAuthenticator? (Choose two)
What are three key features of FortiAuthenticator? (Choose three)
Why would you configure an OCSP responder URL in an end-entity certificate?
You have implemented two-factor authentication to enhance security to sensitive enterprise systems.
How could you bypass the need for two-factor authentication for users accessing form specific secured networks?
What capability does the inbound proxy setting provide?
At a minimum, which two configurations are required to enable guest portal services on FortiAuthenticator? (Choose two)