Listing Thumbnail

    Fortinet FortiAuthenticator (BYOL)

     Info
    Deployed on AWS
    AWS Free Tier
    FortiAuthenticator is a centralized user Identity Management solution to transparently identify network users and enforce identity-driven access policy in a Fortinet fabric. It supports FortiToken Two-factor authentication, Certificate and Wireless Guest management and Single Sign On capability.
    4

    Overview

    FortiAuthenticator - Access Management establishing Identity for the Security Fabric

    FortiAuthenticator builds on the foundations of Fortinet Single Sign-on providing secure identity and role-based access to the Fortinet connected network. Through integration with existing Active Directory or LDAP authentication systems, it enables enterprise user identity based security without impeding the user or generating work for network administrators.

    FortiAuthenticator is the gatekeeper of authorization into the Fortinet secured enterprise network identifying users, querying access permissions from third-party systems and communicating this information to FortiGate devices for use in Identity-Based Policies. FortiAuthenticator delivers transparent identification via a wide range of methods: *Polling of an Active Directory Domain Controller; *Integration with FortiAuthenticator Single Sign-On Mobility Agent which detects login, IP address changes and logout; *RADIUS Accounting *SAML SP/IdP Web SSO

    Key FortiAuthenticator Features *Seamless secure two-factor/OTP authentication across the organization in conjunction with FortiToken *RADIUS and LDAP Authentication *Certificate management for enterprise wireless and VPN deployment *Guest management for wired and wireless network security *Single Sign On capabilities for both internal and cloud networks

    Highlights

    • Ability to transparently identify network users and enforce identity-driven policy on a Fortinet-enabled enterprise network
    • Guest management for wired and wireless network security
    • Single Sign On capabilities for both internal and cloud networks

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    OtherLinux V6.2.1

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Fortinet FortiAuthenticator (BYOL)

     Info
    Pricing and entitlements for this product are managed through an external billing relationship between you and the vendor. You activate the product by supplying a license purchased outside of AWS Marketplace, while AWS provides the infrastructure required to launch the product. AWS Subscriptions have no end date and may be canceled any time. However, the cancellation won't affect the status of the external license.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Vendor refund policy

    This is a BYOL product - there are no refund and cancellation policies applied.

    How can we make this page better?

    Tell us how we can improve this page, or report an issue with this product.
    Tell us how we can improve this page, or report an issue with this product.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Additional details

    Usage instructions

    After deploying the instance, click on Manage in AWS Console to see the running instance and public IPv4 address/Public DNS (IPv4) to continue the configuration of the FortiAuthenticator-VM (FAC-VM). In order to access the Web GUI, Configuration should be done through CLI. Connect FAC-VM CLI by SSH using "ssh -i <pem file> admin@<Public IP address>" in Linux. After login in, reset admin password to pwd by executing "execute restore-admin <pwd>". Allow host also should be set. By executing "config system global" to enter the system global configuration mode, afterward, executing "set allowed-hosts <public IPv4 address of FAC>" to set the allowed host so that FAC WEB-GUI can be accessed through https://<public IPv4 address of FAC>. Similarly, execute "set allowed-hosts <Public DNS (IPv4)>" enabling the access through https://<Public DNS (IPv4)>.

    Detailed FortiAuthenticator-VM AWS Install and Configure guide is located at https://docs.fortinet.com/fortiauthenticator 

    Update the FortiAuthenticator in AWS is the same as all FortiAuthenticator platforms. You need to log into your FortiCare account at the https://support.fortinet.com , choose the download link and retrieve the proper upgrade file (.out) you wish to upgrade to. The file is introduced via the Web UI or the CLI.

    Support

    Vendor support

    Fortinet FortiCare support offerings provide global support for all Fortinet products and services. With FortiCare support, customers can be assured that their Fortinet security products are performing optimally and protecting their corporate assets with the best security technology at the best possible price. FortiCare 24x7 Comprehensive Support includes firmware updates, online ticket access, online chat and 24x7 telephone support at any time day or night.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    4
    47 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    32%
    57%
    11%
    0%
    0%
    1 AWS reviews
    |
    46 external reviews
    External reviews are from G2  and PeerSpot .
    MuhammadHaris1

    Two-factor authentication has strengthened access security for internal users and IT teams

    Reviewed on Apr 07, 2026
    Review provided by PeerSpot

    What is most valuable?

    I am utilizing two-factor authentication on Fortinet FortiAuthenticator , and some of the other features are also useful. For example, you can have the domain user authenticated on his machine, but for that part, we need to install Fortinet FortiAuthenticator  installer on that machine separately. That part is also useful, but mostly, two-factor authentication is being utilized via Fortinet FortiAuthenticator on-premise solution, so most of the users go with that part.

    In my opinion, the main benefits that end users receive from Fortinet FortiAuthenticator include more security for their applications, for their systems, and for all their network devices that they are logging into. In the IT department, every IT user will get the two-factor authentication part, plus the normal users will get two-factor authentication by signing into their internal products. Most of the time, it is the benefit of two-factor authentication, which will benefit users in the security scenario.

    What needs improvement?

    Fortinet can make Fortinet FortiAuthenticator better by having a cloud version of it. Currently, Fortinet FortiAuthenticator is only available for on-premises, and it is an on-premises solution. It should be on the cloud, as some other solutions are. For example, Cisco Duo  is on the cloud, so we cannot compete with that part if a user requires a cloud-based two-factor authentication solution.

    What do I think about the stability of the solution?

    I would rate the stability of Fortinet FortiAuthenticator an eight.

    What do I think about the scalability of the solution?

    For scalability, I would rate it a nine.

    How are customer service and support?

    Regarding Fortinet technical support, I would say a six. Most of the time, the engineer will take time, such as 24 hours or 48 hours, maybe even more, because most of the time, they appear, gather the logs, and then disappear.

    Which other solutions did I evaluate?

    The main competitor on the market for Fortinet FortiAuthenticator would be Cisco Duo . However, if a user requires a security perspective on-premises solution, then I do not think any competitor would beat Fortinet FortiAuthenticator.

    What other advice do I have?

    For real-time reporting from Fortinet FortiAuthenticator, I do not have experience. We did not utilize that part because most of the time, two-factor authentication is sufficient for that part in authentication.

    For tracking user activities, I do not know what Fortinet FortiAuthenticator offers because, in my case, the solution would be an internet access gateway in a Fortinet product, which is FortiProxy . That is used for user activity to track that user activity part.

    Regarding the authentication protocol I have mostly worked with on Fortinet FortiAuthenticator, we go with the default ones. We call RADIUS on that FortiGate part and we choose the default. I think PAP will be utilized, or maybe MS-CHAP.

    For the workflow part, I do not know if Fortinet FortiAuthenticator helps clients automate workflows. It may have that feature, but I did not use that feature. Workflow automation, because two-factor authentication is sufficient for that for most clients.

    For the pricing of Fortinet FortiAuthenticator, I have no experience with pricing. I worked on the deployment side and the pre-selling side most of the time. I did not spend time bargaining or comparing products that have low cost or high cost.

    I would rate this review an eight overall.

    Sachin Vinay

    Supports secure remote authentication and provides comprehensive user activity tracking

    Reviewed on Nov 19, 2025
    Review provided by PeerSpot

    What is our primary use case?

    Fortinet FortiAuthenticator  is primarily used for authenticating admin users, including remote admin use cases. Remote  admin use cases utilize Fortinet FortiAuthenticator  to securely authenticate admins for making policy decisions and other administrative functions.

    Multi-factor authentication is implemented in several cases, particularly for VPN and VPN admin use cases where multi-factor logins are provided to users. This approach enhances security because even if one factor is compromised, the other factor remains secure, since both factors being compromised simultaneously is not a typical occurrence. The main benefit is that security is enhanced through this multi-layered approach.

    What is most valuable?

    The most important feature is the security capability because it provides a substantial amount of security for admin-related activities. Fortinet FortiAuthenticator can be used from anywhere in the world, and the authenticator services function globally. This global accessibility is one of the critical advantages, particularly since admin features are critical and security is a real concern. With Fortinet FortiAuthenticator, secure usage of firewall services and related functions is achieved.

    A complete log of all users who access the authenticator setup is maintained. Monthly logs are reviewed to check for any unnoticed activities. Each authenticated user's complete activity history is recorded. This logging capability allows for providing access to more admin users while ensuring security is not compromised and all users can be monitored.

    What needs improvement?

    Fortinet FortiAuthenticator could benefit from some artificial intelligence functionality and resolution of some glitches that may exist.

    For how long have I used the solution?

    Fortinet FortiAuthenticator has been in use for approximately five years.

    What do I think about the scalability of the solution?

    Fortinet FortiAuthenticator is scalable and can support expansion without any issues.

    How are customer service and support?

    The technical support team is proficient and has all necessary resources to support all types of requirements. The quality of technical support staff is high. Compared with other vendors, Fortinet FortiAuthenticator has a good technical support team.

    Which solution did I use previously and why did I switch?

    Many products are used in the industry, including SonicWall and Check Point. However, Fortinet FortiAuthenticator has a better setup for authenticating compared to these alternatives, making it the preferred choice.

    How was the initial setup?

    The setup process was simple.

    What's my experience with pricing, setup cost, and licensing?

    The pricing is rated at eight out of ten.

    What other advice do I have?

    Fortinet FortiAuthenticator has been very helpful. The product functions mostly as intended but not completely. The overall review rating for this product is ten out of ten.

    HenrikPedersen

    Integration with existing infrastructure satisfies enterprise needs

    Reviewed on Jul 17, 2025
    Review provided by PeerSpot

    What is our primary use case?

    A typical use case for Fortinet FortiAuthenticator is that it suits their infrastructure because they have the products.

    What is most valuable?

    One of the best features of Fortinet FortiAuthenticator is integration to the FortiGates.

    What needs improvement?

    The area for improvement in Fortinet FortiAuthenticator is its price.

    For how long have I used the solution?

    I have been working with Fortinet FortiAuthenticator for a couple of years, approximately two years.

    What do I think about the scalability of the solution?

    The scalability of Fortinet FortiAuthenticator rates as high, achieving a perfect score of 10.

    How are customer service and support?

    Technical support from Fortinet deserves a rating of 10. Their service is excellent.

    How was the initial setup?

    The initial setup of Fortinet FortiAuthenticator was straightforward, working effectively out of the box.

    What about the implementation team?

    As a consultant, I have been installing Fortinet FortiAuthenticator at customer sites. I work for a reseller that sells Fortinet products.

    My relationship with Fortinet is as a reseller and implementer.

    What was our ROI?

    I have not directly observed a return on investment from Fortinet FortiAuthenticator. Being in a technical rather than sales role, this aspect is typically handled by the sales team.

    What other advice do I have?

    I have not been working with Fortinet FortiAuthenticator's AI capabilities.

    I would recommend Fortinet FortiAuthenticator to others because of its quality and my positive experience with the solution.

    On a scale of 1-10, I rate Fortinet FortiAuthenticator an 8 overall.

    Omer Rehman Raja

    Ease of deployment and management enhance user experience

    Reviewed on Jul 17, 2025
    Review provided by PeerSpot

    What is our primary use case?

    We use Fortinet FortiAuthenticator  for two-factor authentication and multi-factor authentication. We utilize it as a token for access authentication, including both soft tokens and hard tokens.

    What is most valuable?

    The biggest advantages of Fortinet FortiAuthenticator  are that it's easy to deploy, easy to manage, and the GUI is a very strong interface. The integration with the system is very straightforward.

    Fortinet FortiAuthenticator saves time and money for me and my clients because they have solutions for every device, depending on what the customer wants.

    What needs improvement?

    There is room for improvement in the support for Fortinet FortiAuthenticator. The support team could be enhanced when we face issues.

    Their technical staff needs improvement because they take too much time to resolve issues. When we call them, they have many untrained people and not enough trained staff, which leads to lengthy resolution times.

    What do I think about the stability of the solution?

    From a technical standpoint, I don't think there's any issue with Fortinet FortiAuthenticator. We haven't faced any issues recently. In the early days, there were some issues, but now it's a very stable and mature product.

    Three to four years ago, there were many issues, but now Fortinet FortiAuthenticator is very stable.

    What do I think about the scalability of the solution?

    Fortinet FortiAuthenticator should be sufficiently scalable. I have used the 1,000 license for 1,000 tokens, but I am not aware of the maximum license capacity for tokens.

    How was the initial setup?

    The installation and deployment process is straightforward. The GUI setup involves simple next steps without much technical complexity.

    Which other solutions did I evaluate?

    When comparing Fortinet with Palo Alto, it varies by market. In Saudi Arabia, we suggest Palo Alto for medium to large enterprises, while Fortinet FortiAuthenticator is preferred for small to medium enterprises. Organizations tend not to prefer it in high-end environments or bigger organizations.

    What other advice do I have?

    Regarding compliance features in Fortinet FortiAuthenticator, there is an option to disable or enable compliance, and I enabled that option as a baseline configuration. I have not tried any other compliance features.

    Fortinet FortiAuthenticator is affordable compared to competitors such as Palo Alto.

    I cannot specify how much it can save in terms of money and time.

    Currently, I don't think there are any features that I would want to see included in Fortinet FortiAuthenticator in the future.

    On a scale of 1-10, I rate Fortinet FortiAuthenticator an 8.

    Yonas Abebe

    Integration capabilities simplify authentication and migration challenges need addressing

    Reviewed on Mar 03, 2025
    Review provided by PeerSpot

    What is our primary use case?

    We deployed the solution for a client, and the license supports 100 people. It is leveraged for user authentication when accessing Cisco devices by integrating with Fortinet FortiAuthenticator .

    What is most valuable?

    The integration capabilities of Fortinet FortiAuthenticator  are very interesting, as it can be integrated with third-party devices easily and is straightforward to configure. The integration with FortiToken is outstanding, adding a layer of security for authentication. In addition, it can be used by integrating with zero trust single access, enhancing overall security measures.

    What needs improvement?

    Initially, we deployed Fortinet FortiAuthenticator on VMware and faced challenges when migrating to an OpenStack  environment, which required reconfiguration. I recommend Fortinet make its images migratable between environments.

    For how long have I used the solution?

    I have been using Fortinet FortiAuthenticator for one year.

    What do I think about the stability of the solution?

    I would rate the stability of Fortinet FortiAuthenticator at eight out of ten. It remains stable even when the number of concurrent users increases.

    What do I think about the scalability of the solution?

    I find Fortinet FortiAuthenticator to be highly scalable, and I would rate it an eight out of ten for scalability.

    How are customer service and support?

    Customer service and support are excellent. I find them to be extremely responsive and effective.

    How was the initial setup?

    The initial setup took two days, including integration. We ensured the virtual environment was ready, deployed the VM, integrated it with Active Directory, onboarded the endpoint devices, and provided FortiToken authentication for the 100 users via email.

    What about the implementation team?

    The implementation was carried out by me and my colleague, with assistance from the client's team on configuring the endpoint devices.

    What was our ROI?

    Investing in Fortinet FortiAuthenticator has had a positive impact on overall security costs. It enhances security by ensuring only the right person can access systems, even if their login credentials are compromised.

    What's my experience with pricing, setup cost, and licensing?

    Fortinet FortiAuthenticator is not overly expensive compared to other Fortinet subscriptions. However, it would be beneficial if the licensing allowed for more flexibility to cover additional users.

    What other advice do I have?

    I would recommend Fortinet FortiAuthenticator to other users because of its excellent integration capabilities and security features. The overall rating I would give is a seven. Improvements in migration capabilities are necessary, especially as clients often change environments.

    View all reviews