Which three of the following can be used as SSO sources? (Choose three.)
Question No 2
You have implemented two - factor authentication to enhance security to sensitive enterprise
systems.
How could you bypass the need for two - factor authentication for users accessing form specific
secured networks?
Question No 3
When configuring an active - passive HA deployment, what is the recommended data synchronization
path?
Question No 4
Which FSSO discovery method transparently detects logged off users without having to rely on
external features such as WMI polling?
Question No 5
When performing a remote LDAP server integration with FortiAuthenticator, how do server type
templates assist with the integration?