14-Administrator Accounts
14-Administrator Accounts
Administrator accounts are used to control access to the FortiManager unit. Local and remote
authentication is supported, as well as two-factor authentication. Other administrative
accounts can be created as needed full or read-only access. To create a new administrator
account, you must be logged in to an account with sufficient privileges, or as a super user
administrator. Only administrators with the Super_User profile can see the complete
administrators list. If you do not have certain viewing permissions, you will not see the
administrator list. When ADOMs are enabled, administrators can only access the ADOMs they
have permission to access.
Admin Authentication:
Instead of creating local administrators, where logins are validated by FortiManager, you can
configure external servers to validate your administrator logins. You can use RADIUS, LDAP,
TACACS+, and PKI as means of verifying the administrator credentials. The FortiManager system
supports authentication of administrators locally, remotely with RADIUS, LDAP, or TACACS+
servers, and using PKI. Remote authentication servers can also be added to authentication
groups that administrators can use for authentication.
To use remote authentication servers, you must configure the appropriate server entries in the
FortiManager unit for each authentication server in your network. New LDAP remote
authentication servers can be added and linked to all ADOMs or specific ADOMs.
Go to System Settings > Admin > Profile to view and manage administrator profiles.
System Admin:
For the System Admin type, you can modify one of the predefined profiles, or create a custom
profile. Only administrators with full system permissions can modify administrator profiles.
Depending on the nature of the administrator’s work, access level, or seniority, you can allow
them to view and configure as much, or as little, as required.