Deployment procedures
In this example, a remote LDAP user accesses devices in a Security Fabric using the secret launching feature of FortiPAM where the user is not required to enter any credentials.
We also demonstrate how to configure ZTNA tag-based access to FortiPAM.
Following is an overview of the procedure:
- In FortiPAM, configure the VIP associated with the default proxy rule and ZTNA tag-based access to FortiPAM. See Configuring administrative access to the FortiPAM web interface.
Note: For FortiPAM installation related information, see FortiPAM installation in the latest FortiPAM Administration Guide.
- In FortiPAM, configure a remote LDAP user group and a standard user. See Configuring remote LDAP authentication and user group.
- In FortiPAM, configure secret policy and a folder where the secrets are contained. See Configuring secret policy and folder.
- In FortiPAM, configure secrets for every security fabric device. See Configuring secrets for every security fabric device.
- From a client PC, verify user access to the Security Fabric and view secret related video recordings. See Verifying user access to the Security Fabric.