zerotrust
Fortinet ZTNA Part VIII
Finalizing Fortinet ZTNA: Rules, Verification, and Testing In this final installment of the Fortinet ZTNA series, we will explore FortiGate ZTNA rules, conduct final verifications, and test the proof of concept (POC) from an end-user perspective. ZTNA Rules ZTNA rules define access policies using …
Fortinet ZTNA Part VII
Introduction Welcome to the seventh installment of our Fortinet ZTNA series! In this guide, we explore the configuration of ZTNA tags and tagging rules—essential components that determine whether an endpoint is compliant or non-compliant when accessing data center (DC) resources. This step-by-step …
Fortinet ZTNA Part VI
In this sixth installment of our Fortinet ZTNA series, we delve into the configuration of ZTNA destinations in FortiEMS. These destinations play a crucial role in enabling secure access to internal resources through the access proxy. This guide provides a step-by-step overview of setting up ZTNA …
Fortinet ZTNA Part V
Introduction In this fifth installment of our Fortinet ZTNA series, we explore ZTNA certificate management and its role in securing client authentication and access control. ZTNA Certificate Management FortiClient EMS plays a central role in managing certificates for ZTNA authentication. Below are …
Fortinet ZTNA Part IV
Introduction In this fourth installment of our Fortinet ZTNA series, we delve into ZTNA access proxy server types and how each is applied in our Proof of Concept (PoC). The ZTNA server defines the access proxy VIP and the real servers that clients connect to. Once configured, client requests are …
Fortinet ZTNA Part III
In this third installment of our Fortinet ZTNA series, we explore integrating SAML authentication with Microsoft Azure as the Identity Provider (IdP) and FortiGate as the Service Provider (SP). By leveraging SAML, authentication is offloaded from the access proxy to the IdP, allowing organizations …
Fortinet ZTNA Part II
In the second part of our Fortinet ZTNA series, we explore a practical use case involving remote access to basic on-premises data center resources. The following high-level diagram illustrates the setup: This scenario involves the need for remote access to four servers within the data center, each …
Fortinet ZTNA Part I
Solution Overview Definition & Overview Zero Trust Network Access (ZTNA) is an advanced access control method that leverages client device identification, authentication, and Zero Trust tags to provide role-based access to applications. ZTNA enables administrators to manage network access for …