A device or user identity cannot be established transparently, such as with non-domain BYOD devices, and allow users to create their own credentials.In this case, which user identity discovery method can FortiAuthenticator use?
You are a Wi-Fi provider and host multiple domains.How do you delegate user accounts, user groups and permissions per domain when they are authenticating on a single FortiAuthenticator device?
You are the administrator of a large network that includes a large local user datadabase on the current Fortiauthenticatior. You want to import all the local users into a new Fortiauthenticator device.Which method should you use to migrate the local users?