Fortinet black logo
1.3.0

Deployment procedures

Deployment procedures

In this example, a remote LDAP user accesses devices in a Security Fabric using the secret launching feature of FortiPAM where the user is not required to enter any credentials.

We also demonstrate how to configure ZTNA tag-based access to FortiPAM.

Following is an overview of the procedure:

  1. In FortiPAM, configure the VIP associated with the default proxy rule and ZTNA tag-based access to FortiPAM. See Configuring administrative access to the FortiPAM web interface.

    Note: For FortiPAM installation related information, see FortiPAM installation in the latest FortiPAM Administration Guide.

  2. In FortiPAM, configure a remote LDAP user group and a standard user. See Configuring remote LDAP authentication and user group.
  3. In FortiPAM, configure secret policy and a folder where the secrets are contained. See Configuring secret policy and folder.
  4. In FortiPAM, configure secrets for every security fabric device. See Configuring secrets for every security fabric device.
  5. From a client PC, verify user access to the Security Fabric and view secret related video recordings. See Verifying user access to the Security Fabric.

Deployment procedures

In this example, a remote LDAP user accesses devices in a Security Fabric using the secret launching feature of FortiPAM where the user is not required to enter any credentials.

We also demonstrate how to configure ZTNA tag-based access to FortiPAM.

Following is an overview of the procedure:

  1. In FortiPAM, configure the VIP associated with the default proxy rule and ZTNA tag-based access to FortiPAM. See Configuring administrative access to the FortiPAM web interface.

    Note: For FortiPAM installation related information, see FortiPAM installation in the latest FortiPAM Administration Guide.

  2. In FortiPAM, configure a remote LDAP user group and a standard user. See Configuring remote LDAP authentication and user group.
  3. In FortiPAM, configure secret policy and a folder where the secrets are contained. See Configuring secret policy and folder.
  4. In FortiPAM, configure secrets for every security fabric device. See Configuring secrets for every security fabric device.
  5. From a client PC, verify user access to the Security Fabric and view secret related video recordings. See Verifying user access to the Security Fabric.