Fortinet black logo

Administration Guide

Before you begin

Before you begin

Before you begin using this guide, please ensure that:

  • You have administrative access to the GUI and/or CLI.
  • For details of how to accomplish this, see the QuickStart Guide provided with your product, or online at https://docs.fortinet.com/product/fortiauthenticator/hardware.

  • FortiAuthenticator is integrated into your network.
  • The operation mode has been configured.
  • The system time, DNS settings, administrator password, and network interfaces have been configured.

    Network Time Protocol (NTP) is critical for maintaining accurate and stable time, and is required when using the Time-based One-time Password (TOTP) method for two-factor authentication. For more information, see Configuring the system date, time, and time zone.

  • Any third-party software or servers have been configured using their documentation.

While using the instructions in this guide, note that administrators are assumed to have all permissions, unless otherwise specified. Some restrictions will apply to administrators with limited permissions.

Before you begin

Before you begin using this guide, please ensure that:

  • You have administrative access to the GUI and/or CLI.
  • For details of how to accomplish this, see the QuickStart Guide provided with your product, or online at https://docs.fortinet.com/product/fortiauthenticator/hardware.

  • FortiAuthenticator is integrated into your network.
  • The operation mode has been configured.
  • The system time, DNS settings, administrator password, and network interfaces have been configured.

    Network Time Protocol (NTP) is critical for maintaining accurate and stable time, and is required when using the Time-based One-time Password (TOTP) method for two-factor authentication. For more information, see Configuring the system date, time, and time zone.

  • Any third-party software or servers have been configured using their documentation.

While using the instructions in this guide, note that administrators are assumed to have all permissions, unless otherwise specified. Some restrictions will apply to administrators with limited permissions.