Q: 8
An administrator wants users and devices that cannot be identified transparently, such as Android
BYOD devices, to be able to register and create their own credentials.
In this case, which FortiAuthenticator user identity discovery method can the administrator use?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.