Fortinet black logo

User Guide

Configuring an authentication rule

Configuring an authentication rule

An authentication rule defines sources and destinations that require authentication and the authentication scheme applied.

To create or edit an authentication rule:
  1. Go to Policy.
  2. With the appropriate device selected, select Authentication Rules in the Policy type dropdown list.
  3. Click Create or select a policy and click Edit.
  4. In the form, enter the following information:

    Settings

    Guidelines

    Name

    Enter a name for the policy.

    IPv4 Source Address

    Select the IPv4 source addresses.

    IPv6 Source Address

    Select the IPv6 source addresses.

    Protocol

    Select the protocol this rule applies to.

    Authentication Scheme

    Select the authentication scheme to use. See Configuring an authentication scheme.

    IP-based Authentication

    Enable or disable IP-based authentication.

    SSO Authentication Scheme

    Select the authentication scheme to use for single sign-on.

    This option is only available when IP-based Authentication is enabled.

    Comments

    Optionally, enter a comment for the policy.

  5. Click Save.

Configuring an authentication rule

An authentication rule defines sources and destinations that require authentication and the authentication scheme applied.

To create or edit an authentication rule:
  1. Go to Policy.
  2. With the appropriate device selected, select Authentication Rules in the Policy type dropdown list.
  3. Click Create or select a policy and click Edit.
  4. In the form, enter the following information:

    Settings

    Guidelines

    Name

    Enter a name for the policy.

    IPv4 Source Address

    Select the IPv4 source addresses.

    IPv6 Source Address

    Select the IPv6 source addresses.

    Protocol

    Select the protocol this rule applies to.

    Authentication Scheme

    Select the authentication scheme to use. See Configuring an authentication scheme.

    IP-based Authentication

    Enable or disable IP-based authentication.

    SSO Authentication Scheme

    Select the authentication scheme to use for single sign-on.

    This option is only available when IP-based Authentication is enabled.

    Comments

    Optionally, enter a comment for the policy.

  5. Click Save.