A device or useridentity cannot be established transparently, such as with non-domain BYOD devices, and allow users to create their own credentialis.
In this case, which user idendity discovery method can Fortiauthenticator use?
Correct Answer:
D
Which option correctly describes an SP-initiated SSO SAML packet flow for a host without a SAML assertion?
Correct Answer:
C
Which interface services must be enabled for the SCEP client to connect to Authenticator?
Correct Answer:
D
Which method is the most secure way of delivering FortiToken data once the token has been seeded?
Correct Answer:
B
Which EAP method is known as the outer authentication method?
Correct Answer:
A