{"FileId":"MzlfODc4MjE5ODBfbGRPdjI","Name":"How is user-based authentication enforced within firewall policies in the Fortinet FCP_FGT_AD-7.pdf","GroupID":0,"Extension":"pdf","Size":"71206","Views":"0","Version":"","Downloads":"66","DateTrashed":"0","DateModified":"1756316594","Access":"2","FileHash":"74d5c7550546bd534c8287a8ff58b474","Link":"https:\/\/od.lk\/f\/MzlfODc4MjE5ODBf","DownloadLink":"https:\/\/od.lk\/d\/MzlfODc4MjE5ODBf\/How%20is%20user-based%20authentication%20enforced%20within%20firewall%20policies%20in%20the%20Fortinet%20FCP_FGT_AD-7.pdf","StreamingLink":"https:\/\/od.lk\/s\/MzlfODc4MjE5ODBf\/How%20is%20user-based%20authentication%20enforced%20within%20firewall%20policies%20in%20the%20Fortinet%20FCP_FGT_AD-7.pdf","OwnerName":"George Burks","BWExceeded":0,"Encrypted":0,"Password":"","BrandingMenuBgColor":"","BrandingMenuFontColor":"","EditOnline":1,"Description":"","IsArchive":"0","Date":"1756316594","DateUploaded":1756316594,"DateAccessed":"0","AccessDisabled":0,"DestURL":"","Owner":"2128139","AccessUser":"0","DirUpdateTime":1775294703}