FortiAuthenticator Study Guide
FortiAuthenticator Study Guide
© FORTINET
FortiAuthenticator
Study Guide
for FortiAuthenticator 6.4
DO NOT REPRINT
© FORTINET
Fortinet Training Institute - Library
https://training.fortinet.com
https://docs.fortinet.com
https://kb.fortinet.com
https://fusecommunity.fortinet.com/home
Fortinet Forums
https://forum.fortinet.com
https://support.fortinet.com
FortiGuard Labs
https://www.fortiguard.com
https://www.fortinet.com/nse-training
https://home.pearsonvue.com/fortinet
https://helpdesk.training.fortinet.com/support/home
7/15/2022
DO NOT REPRINT
© FORTINET
TABLE OF CONTENTS
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about the key features and concepts of FortiAuthenticator and how to configure
the FortiAuthenticator for initial setup.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about the topics shown on this slide.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in authentication and the role of FortiAuthenticator, you will be able to define
authentication and understand the role of FortiAuthenticator in your own network.
DO NOT REPRINT
© FORTINET
Authentication is the act—or process—of verifying the validity of a claimed identity. Confirmation of identity is
necessary in the digital world, because granting access to a resource, approving a transaction request,
trusting the validity of a document, and so on, before verifying a person is who they say they are, can lead to a
serious network security breach.
So how do you confirm the identity of a digital user? You can confirm user identities based on something the
user knows (for example, a password or PIN), or something the user has (for example, a digital certificate or
token), or a combination of both methods.
DO NOT REPRINT
© FORTINET
FortiAuthenticator is a device that provides standards-based secure authentication to the entire network
infrastructure. That is, it verifies the validity of a claimed identity. FortiAuthenticator accepts many different
user identification methods (token, digital certificate, and so on) through different access points (local, remote,
wireless, guest, and so on).
FortiAuthenticator also centralizes the management and storage of user identity information, increasing the
efficiency of administration, and increasing control over who accesses the network.
The example shown on this slide demonstrates the advantage of two-factor authentication. The user’s
username and password have been compromised by a bad actor (this is often done using phishing or spear
phishing attacks), but because the bad actor does not possess the token, access will still be denied.
DO NOT REPRINT
© FORTINET
This slide covers all of the hardware and virtual models available.
The virtual machine (VM) version of FortiAuthenticator is popular with customers that have existing virtual
infrastructure. One of the main benefits of the VM version is that you can add CPU and RAM to your systems
as your needs grow. You then purchase user licenses for the VMs to suit your customers needs. These
licenses are stackable, which makes them ideal for customers who are looking to expand over time.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Good job! You now understand authentication and the role of FortiAuthenticator.
Now, you will learn about the key features of FortiAuthenticator, and the comparisons between
FortiAuthenticator and FortiGate.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in understanding the key features of FortiAuthenticator, and the comparisons
between FortiAuthenticator and FortiGate, you will be able to use the device effectively in your own network.
DO NOT REPRINT
© FORTINET
FortiAuthenticator is a user authentication and identity management device. Some of the key features include:
two-factor authentication, wired or wireless authentication using the 802.1X standard, certificate management,
portal services, and Fortinet single sign-on (FSSO).
Multi-factor authentication increases network security by requiring multiple pieces of identification (known as
factors). It combines something you know with something you have to reliably confirm your identity.
FortiAuthenticator supports wired and wireless networking with the IEEE 802.1X standard. 802.1X
authentication provides an additional security barrier for your intranet. Just as an authenticated wireless client
must submit a set of credentials to be validated before being allowed access, an 802.1X wired client must also
perform authentication before being able to send traffic over its switch port.
FortiAuthenticator has several roles that involve digital certificates, including acting as a certificate authority
(CA), a SCEP server, authenticating users against an external LDAP server, and authenticating users using
Extensible Authentication Protocol (EAP). You will explore certificate management further in the Certificate
Management lesson.
FSSO enables FortiAuthenticator to leverage your network’s existing authentication system for firewall
authentication. After a user logs in, they can access other network resources without having to authenticate
again—authentication is transparent. You will explore FSSO further in the Fortinet Single Sign-On lesson.
Portal services allows you to grant remote users access to specific portions of your network, using delegated
authentication. In this scenario, authentication requires the user to associate their device with the guest SSID,
as published by the FortiGate wireless controller.
DO NOT REPRINT
© FORTINET
The table on this slide shows some of the key differences in RADIUS capabilities between FortiGate and
FortiAuthenticator.
As a RADIUS server, FortiAuthenticator provides authentication and authorization both as a server and as a
proxy. RADIUS rules can be used for FSSO updates.
DO NOT REPRINT
© FORTINET
The table on this slide shows some of the key differences in LDAP capabilities between FortiGate and
FortiAuthenticator beyond active directory synchronization.
DO NOT REPRINT
© FORTINET
FortiAuthenticator can retrieve FSSO identity information from a variety of sources, including the FortiClient
mobility agent, Syslog messaging, Windows domain polling, and RADIUS accounting. FortiAuthenticator then
passes gathered user, group, and IP address information to FortiGate devices.
You can use FortiAuthenticator to restrict the number of devices per FSSO user.
DO NOT REPRINT
© FORTINET
FortiAuthenticator offers SAML support for end-user SSO and can act as both an identity provider (IdP) and a
service provider (SP).
FortiAuthenticator can act as a certificate authority (CA) and provide certificate auto-enrollment using SCEP
or OCSP.
FortiAuthenticator social authentication provides users with the ability to validate using social media sites,
such as Facebook, Twitter, LinkedIn, and Google.
DO NOT REPRINT
© FORTINET
FortiAuthenticator provides the ability to centrally manage tokens. For example, a single token can be used to
access many FortiGate devices instead of a separate token for each FortiGate. Tokens can be pushed using
SMS.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Good job! You now understand the key features of FortiAuthenticator, and comparisons between
FortiAuthenticator and FortiGate.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in the initial configuration of FortiAuthenticator, you will be able to deploy
FortiAuthenticator in your own network and perform basic administrative tasks.
DO NOT REPRINT
© FORTINET
The number of ports for each FortiAuthenticator model varies, however port1 is the management port, and its
default IP address is 192.168.1.99.
DO NOT REPRINT
© FORTINET
If you are using the GUI to configure FortiAuthenticator, you need to connect an Ethernet cable between
FortiAuthenticator and the management computer on port1. You also must configure the management
computer to be on the same subnet as the FortiAuthenticator port1 interface.
To log in, open a supported browser and enter the default IP address preceded by https://. At the login
screen, use the factory default information for the administrator account. The username is admin. When
prompted do not enter a password. During the initial login, FortiAuthenticator will prompt you to create a
password.
If you are using the CLI configuration tool to configure FortiAuthenticator, use a terminal emulation application,
such as PuTTY. Because of the limited functionality of the CLI, there is no CLI Console widget on the web-
based manager, like there is for other Fortinet products.
On the terminal emulation application, enter the default FortiAuthenticator port1 IP address and select a
supported management access protocol. SSH is the only protocol enabled by default.
DO NOT REPRINT
© FORTINET
The status dashboard is the landing page for administrators after login. The dashboard contains widgets that
display different types of real-time information. It should be one of the first places you look for any signs of
trouble every time you log in.
DO NOT REPRINT
© FORTINET
After you log in, you must configure the interface, the primary and secondary DNS server IP addresses, static
routing (which includes the default gateway), and system time. For the sake of simplicity, in this lesson, the
GUI is used to explain the configuration requirements.
You perform all initial configuration tasks on the same area of the GUI. Click System > Network.
You must fulfill some requirements for your network during configuration. At a minimum, you must ensure
specific ports are open in the security policies between the RADIUS authentication clients and
FortiAuthenticator.
DO NOT REPRINT
© FORTINET
You can configure the interface network settings on the Interfaces page. This includes setting an IP address
and netmask, as well as supported administrator access and system protocols.
You must edit the default IP address and netmask associated with the port1/MGMT interface, based on your
own network. This provides more security than using the default IP address and, if more than one
FortiAuthenticator is located in the network, different network settings are mandatory (the management
interface must have a dedicated address). You can assign IPv4 and IPv6 addresses, which must be static.
Administrator access for IPv4 and IPv6 have been separated, so you can mix and match the options you
want.
You must also select the administrative protocols you want to support. Any interface that is used to provide
administration access to FortiAuthenticator requires at least HTTP or HTTPS, for GUI access, or SSH for CLI
access. By default, HTTPS and SSH are enabled on FortiAuthenticator.
Finally, you must select the services you want to allow. These are tied to the functionality you want to employ
and several are already enabled by default. You will learn about many of these services throughout the
training.
FortiAuthenticator supports the receipt of messages from a syslog source over a TLS connection using TCP
port 6514.
DO NOT REPRINT
© FORTINET
For security reasons, hosts may access the FortiAuthenticator GUI only if they are on the same domain or on
the same network as FortiAuthenticator, and, even then, only if the interface has HTTP or HTTPS for GUI
access enabled. You can allow additional hosts by designated IP address or domain name, from the System
Access page.
DO NOT REPRINT
© FORTINET
You can define the number of REST API requests in the System Access view. Limiting the number of
requests is essential to preventing DoS attacks as well as providing scalability.
The inbound proxy settings allow FortiAuthenticator to determine origin of the source IP address after the
traffic has been forwarded through a proxy:
* From the FORWARDED HTTP header
* From the X_FORWARDED HTTP header
You can also set FortiAuthenticator to restrict admin access based on trusted IP addresses or subnets, by
configuring valid FORWARDED “by” values.
DO NOT REPRINT
© FORTINET
The domain name system (DNS), ensures human-friendly hostnames are translated into IP addresses—the
DNS resolves hostnames. Specific FortiAuthenticator functionalities rely on the use of the DNS, for example,
any feature that requires sending notification emails to users or administrators. For this reason,
FortiAuthenticator must have a reliable and stable connection to a DNS server.
You can configure the DNS on the DNS page. The DNS servers must be reachable from the networks to
which FortiAuthenticator connects and should specify two different addresses: a primary and a secondary.
The secondary DNS server is used in cases where there is no reply from the primary DNS server.
The default primary and secondary DNS server addresses are the FortiGuard DNS servers. You can use
these or change the address to another.
Note that in an Active Directory (AD) environment and using AD authentication, you should use the domain
DNS servers as the DNS servers.
DO NOT REPRINT
© FORTINET
You can configure the default gateway associated with the interface on the Static Routing page.
The default gateway is the next hop that routes internal traffic to another, usually external, network. To
simplify, a default gateway acts as an entry and exit point in a network. All computers on your local network
need to know the default gateway IP address in order to access the Internet. To configure, click Edit and add
the next hop IP address of FortiAuthenticator to the Gateway field.
If you want to configure another port on FortiAuthenticator, you can assign specific IPv4 or IPv6 static routes
to a different gateway so that packets are delivered by a different route. Click Create New to create a new
route. Here, you need to configure the destination IP address and mask, the gateway, and the interface (port).
DO NOT REPRINT
© FORTINET
You can either manually set the FortiAuthenticator system time and date, or configure FortiAuthenticator to
automatically keep its system time correct by synchronizing with an NTP server. NTP is a standard protocol
used for clock synchronization. You should synchronize FortiAuthenticator with an NTP server because, for
many features to work, the FortiAuthenticator system time must be accurate.
For example, for the time-based one-time password (TOTP) method used in two-factor authentication to
function correctly, it is critical for the time to be accurate and stable. NTP servers provide this necessary
accuracy and stability.
You can configure NTP servers in the System Information widget. In the System Time field, click Change
and then enable NTP enabled, and type the IP address of the NTP server. By default, the FortiAuthenticator
uses Fortinet NTP servers (ntp1.fortinet.net).
DO NOT REPRINT
© FORTINET
It’s always a good idea to make sure all the integral configurations are in place, such as:
• Network interfaces
• DNS servers (required for token/SMS/license registration)
• Time zone and NTP server (critical if using time-based tokens)
• License (trial license provides limited functionality)
• Mail servers (After configuration, don’t forget to set the default mail server!)
DO NOT REPRINT
© FORTINET
As a best practice, after complete the FortiAuthenticator deployment, you should back it up to your
management computer. The Restore/Backup option is located in the dropdown list in the upper-right of the
GUI.
The backup includes both the CLI and GUI device configurations. It also includes information on users, user
groups, the FortiToken device list, the authentication client list, the LDAP directory tree, FSSO settings,
remote LDAP, and certificates.The backup file is encrypted to prevent tampering. You can create multiple
backups, from different points in time. Make sure you name the file to indicate the time of the backup.
If you make changes to FortiAuthenticator that negatively affect your network, you can restore a configuration
from any of the backups.
The backup files can be encrypted using a password. The administrator must supply the password when
restoring an encrypted configuration file. Encryption is disabled by default. The backup files can be password
protected to prevent unauthorized restoration.
Note that you can restore the configuration only to the same build and hardware version.
DO NOT REPRINT
© FORTINET
This diagram shows all the FortiAuthenticator ports. It is a useful reference that you can use when you
configure your FortiAuthenticator.
DO NOT REPRINT
© FORTINET
Finally, to locate general system and diagnostic information, you can enter the status and hardware-
info commands on the CLI.
The get system status command displays the firmware build number, unit serial number, system time,
disk usage and size, and HA status.
The get hardware command displays information about the CPU, memory, NIC, disk, and RAID.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Now, you will review the objectives that you covered in this lesson.
DO NOT REPRINT
© FORTINET
This slide shows the objectives that you covered in this lesson.
By mastering the objectives covered in this lesson, you learned about the key features of FortiAuthenticator,
and how to configure FortiAuthenticator for initial setup.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about the key features and concepts of FortiAuthenticator and how to configure
FortiAuthenticator for initial setup.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about the topics shown on this slide.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in the initial configuration of FortiAuthenticator, you will be able to set up
administrator privileges and provide administrator roles to users.
DO NOT REPRINT
© FORTINET
FortiAuthenticator includes two administrator profiles by default (Sponsor and Read-only Administrator).
You can create additional administrator profiles using the permission sets and individual permissions.
An administrator profile comprises one or more permission sets. A permission set, in turn, comprises
individual permissions. For example, the Local LDAP Service permission shown on this slide includes the
individual permissions within this permission set. Note that the list of permissions shown on this slide is not
the full list.
Administrative profiles are useful for dividing responsibilities and controlling administrator access. For
example, an administrator user who has been granted only the Certificate Management permission set
cannot add or delete local users, because those permissions are assigned, by default, to a different
permission set (users and devices).
By default, the admin administrator has full access, which includes all permission sets and associated
permissions.
DO NOT REPRINT
© FORTINET
You can create administrator profiles on the Admin Profiles page. You must assign a name to the profile and
optionally provide a description.
To see which individual permissions make up a permission set, click Permission sets, and then click the
permission set name.
DO NOT REPRINT
© FORTINET
After you click Permission sets, the full list of built-in permission sets opens.
Built-in permission sets are static. You cannot add or remove individual permissions; however, you can clone
the built-in permission sets and then customize the cloned permission sets.
In this lesson, you will look at how to clone and modify a built-in permission set and create a new, custom one.
DO NOT REPRINT
© FORTINET
To clone an existing permission set for customization, select the permission set you want to clone and click
Clone. A page opens that shows you which permissions are currently associated with the cloned permission
set (these are located on the Selected user permissions pane), and which permissions are available to use
(these are located on the Available user permissions pane). You can move permissions to and from these
two panes using the arrow buttons.
DO NOT REPRINT
© FORTINET
If you would rather create a new permission set than clone an existing one, click Create New. Provide your
new permission set with a name and then move individual permissions from the Available user permissions
pane to the Selected user permissions pane.
You can continue to add or remove permissions at any time. Just ensure the name or description aptly
identifies the permission set after modification.
DO NOT REPRINT
© FORTINET
After you have some administrator profiles, you can create administrator user accounts and assign profiles.
You can create an administrator user account on the Local Users page by clicking Create New. You must set
a user name and password.
There are three ways to handle the password. You can specify a password and communicate it to the
administrator user, have FortiAuthenticator create a random password and automatically email it to the
administrator user (you must assign an email to the user), or specify token-based authentication rather than
password-based authentication. With the last option, FortiAuthenticator adds the account, but it is disabled
until you associate a FortiToken with the user account. You will examine FortiTokens further in another
lesson.
DO NOT REPRINT
© FORTINET
In the Role field, select Administrator to make the user an administrator user. As you can see, administrator
accounts on FortiAuthenticator are standard user accounts (local or remote users) flagged as administrators.
You will learn about creating end users in another lesson.
You can assign the administrator full permissions, which provides all permission sets and associated
permissions like a super user (this is what the admin administrator is assigned), or select a preconfigured
administrator profile in the Admin profiles drop-down list.
DO NOT REPRINT
© FORTINET
After you add the administrator user account, you are presented with additional account settings that you can
configure, such as:
• Admin profiles: You can apply multiple administrator profiles to an administrative account. The most
permissive of the union will be applied.
• Web service access: Allows administrators to access web services using REST API or a client
application.
• Restrict admin login from trusted management subnets only: Allows you to restrict administrator
access to the GUI based on IP address. You can even restrict an administrator to a single IP address if you
define only one trusted host IP. However, FortiAuthenticator allows you to configure up to 10 trusted hosts.
You can also expand each of the sections shown on the slide to configure additional settings. This includes
specifying additional user information (address, phone/mobile number, language, and organization),
alternative email addresses, groups, email routing, and more. You can also set password recovery options.
Here, FortiAuthenticator can send local users a password recovery link for lost or forgotten passwords,
through email or in a browser, in response to a prearranged security question. The user must then set a new
password.
DO NOT REPRINT
© FORTINET
You can define certificate bindings and RADIUS attributes as part of a local user configuration for use during
authentication. The certificate bindings require a designation of the common name (CN) on the certificate as
well as the certificate authority (CA). The defined RADIUS attributes will be passed upon authentication to the
authenticator. These attributes can specify user-related information.
DO NOT REPRINT
© FORTINET
When you complete the creation of an administrative user, or attempt to apply modifications to an existing
administrative user, you must supply the currently logged-in administrative user’s password as validation. This
validation provides an additional layer of security. If validation is not successful FortiAuthenticator ends the
user's session.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Now, you will learn about high availability (HA) modes and messaging services.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in HA and messaging services, you will be able to explain the different HA
modes; list the HA roles; configure message settings for SMTP, email, and SMS gateway; and configure
SNMP.
DO NOT REPRINT
© FORTINET
If your deployment has more than one FortiAuthenticator device, you can choose to operate the
FortiAuthenticator devices as an HA cluster, to provide even higher reliability. All devices must run the same
firmware version.
• Cluster (active-passive) mode (Cluster member designation in the GUI): In this mode, everything is
synchronized and is failover only. You designate one device as the primary and one as the secondary.
Layer 2 connectivity is required for data synchronization.
• An active-passive cluster can have up to 10 load-balancers.
• Active-passive clusters cannot be a mix of physical and virtual appliances.
• Load-balancing (active-active mode or geo-HA). In this mode, one device acts as the primary (Standalone
Primary designation on the GUI) with up to 10 load balancing systems (Load Balancer designation on the
GUI). You can separate the load balancers geographically, and you can distribute the load across the
devices using your preferred method, such as round-robin DNS, or Auth/NAS client load distribution. You
can also use external load balancing devices. This type of configuration is intended for two
FortiAuthenticator deployments because it syncs the user authentication configuration (such as users,
groups, tokens, and so on). It does not sync FSSO and certificates.
• Load balancing can use a mix of physical and virtual appliances.
DO NOT REPRINT
© FORTINET
You can configure load balancing as part of a FortiAuthenticator active-passive cluster to achieve fault
tolerance. In the example shown on this slide, Ottawa and Ottawa-DR are configured in an active-passive HA
configuration. Layer 2 connectivity between Ottawa and the Ottawa-DR location is required for
synchronization. If Ottawa became unresponsive, Ottawa-DR would no longer receive updates and would
become the primary. You select a port to be dedicated for data synchronization between the active and
standby FortiAuthenticator. The interface should not have an IP address already assigned and it must be the
same interface on both the primary and standby device. Fortinet recommends a direct cable connection for
data synchronization.
You can synchronize administrator or sponsor accounts. Each administrator and sponsor account has an
option to include the account in load balancing HA configurations. In addition, FortiAuthenticator synchronizes
certificate bindings for both local and remote users.
DO NOT REPRINT
© FORTINET
You enable HA on the High Availability page. Depending on which HA role you select, different fields appear
in order to configure that particular role.
Cluster member: In the cluster member role, one device is active and the other is on standby (passive). If the
active device fails, the standby becomes active. The cluster is configured as a single authentication server on
FortiGate. Authentication requests made during a failover from one device to another are lost, but subsequent
requests complete normally. The failover process takes approximately 30 seconds. You can configure up to
10 load balancing devices.
Use one of the maintenance modes when you need to make changes to a system setup and quickly return to
it to its HA role. The three maintenance mode options are:
Interface: The interface that will be used for data synchronization between the primary and standby
FortiAuthenticator. The IP address for this interface is configured here.
Password: A password must be entered for use as a shared key for Ipsec encryption, and must be the same
on both the primary and standby devices.
DO NOT REPRINT
© FORTINET
You can use load balancing as an HA method across geographically separated locations and Layer 3
networks. In this configuration, FortiAuthenticator is designated as the standalone primary device. Up to 10
other FortiAuthenticator devices can be configured as load balancers. The standalone primary device keeps
the load balancers synchronized, and the traffic is balanced using an external method chosen by the
administrator.
DO NOT REPRINT
© FORTINET
You configure geographically distributed load balancing on the High Availability page.
The Role setting for the standalone primary FortiAuthenticator should be Standalone primary. The
standalone primary is the primary system where users, groups, and tokens are configured. The load
balancers are synchronized to the primary. To improve the resilience of the primary system, up to 10 load-
balancer devices can be configured.
The Password field must configured in the standalone primary configuration, and again in the load balancer
configurations.
The load balancing FortiAuthenticator devices must be added to the Load Balancers list using the Add
Secondary Load Balancer button. You must provide a name and IP address for each load balancer.
DO NOT REPRINT
© FORTINET
The Role setting for each FortiAuthenticator that will participate as a load balancer must be Load Balancer.
The Load Balancing primary IP address field must contain the IP address of the standalone primary. The
Password field must match the password set in the standalone primary configuration.
DO NOT REPRINT
© FORTINET
FortiAuthenticator can be also be configured as an active-passive cluster with geographically distributed load
balancing. In the example shown on this slide, Ottawa and Ottawa-DR are configured in an active-passive HA
configuration.
Regardless of which member of the active-passive cluster is currently active, the load is distributed across the
load balancers, using your preferred method, such as round-robin DNS, Auth/NAS client load distribution, or
external load balancing devices. The primary and secondary systems can also each function as a standalone
primary device.
FortiAuthenticator synchronizes certificate bindings to load balancers for both local and remote users.
DO NOT REPRINT
© FORTINET
The HA Status page displays the current status of the device, including Node type (for example, Cluster
member, Standalone Primary, or Load Balancer), Priority (high or low), Serial number, and Status.
DO NOT REPRINT
© FORTINET
By default, FortiAuthenticator uses the built-in SMTP server. This is provided for convenience, but is not
necessarily optimal for production environments. Antispam methods can block mail, so you should relay email
through an official, external mail server for your domain.
To configure a new SMTP server, you require a name, server IP address, port (default 25), and sender email
address. You can also choose to use a secure connection to the mail server by selecting STARTTLS. Note
that you must import the CA certificate that validates the server’s certificate for STARTTLS to work. You will
examine CA certificates in another lesson.
Lastly, if the email server requires that you authenticate when sending mail, you can enable authentication
and set the account username and password.
DO NOT REPRINT
© FORTINET
You can select any configured SMTP server and click on the Set as Default button to designate that server
as the default SMTP server. On the Email Services page, you can select the server that will be used by
administrators and the server that will be used for users. The SMTP Server drop-down list will contains all
configured SMTP servers, as well as a selection to use the server marked as default.
DO NOT REPRINT
© FORTINET
To provide more actionable information, FortiAuthenticator provides detailed logging of failed SMTP send
attempts for administrative users. You can review these logs in the Logs view.
DO NOT REPRINT
© FORTINET
FortiAuthenticator provides two distinct email services: one for administrators and one for users.
For each recipient group (administrators and users), you can specify the SMTP server to use, as well as
customize the public address, which is the address or link to the site that the email recipients will receive.
Options include:
• Automatic discovery: Use DNS domain name if configured, or automatically obtain address from the
browser or an active network interface.
• Specify an address: Manually enter the address and port number.
• Use the IP address for a network interface: Select a specific network interface in the drop-down list.
DO NOT REPRINT
© FORTINET
If you want to send SMS messages to users, you must configure the SMS gateways. The FortiAuthenticator
SMS gateway configuration differs according to the protocol your SMS provider uses, such as SMTP, HTTP,
or HTTPS, so you must ask your SMS provider for information about using its gateway.
When configuring SMS gateways you can specify how the mobile number is sent. The available options are
JSON String and JSON Number.
DO NOT REPRINT
© FORTINET
SNMP allows you to monitor hardware on your network. You can configure the hardware, such as the
FortiAuthenticator SNMP agent, to report system information and send traps (alarms or event messages) to
SNMP managers. An SNMP manager, or host, is typically a computer running an application that can read the
incoming trap and event messages from the agent, and send SNMP queries to the SNMP agents.
Using an SNMP manager, you can access SNMP traps and data from any FortiAuthenticator interface
configured for SNMP management access. Part of configuring an SNMP manager is listing it as a host in a
community on the FortiAuthenticator device it will be monitoring. Otherwise, the SNMP monitor does not
receive any traps from that device, and cannot query that device.
Note that the FortiAuthenticator SNMP implementation is read-only. SNMP v1, v2c, and v3 managers have
read-only access to system information through queries and can receive trap messages from
FortiAuthenticator.
DO NOT REPRINT
© FORTINET
You can configure SNMP on the SNMP page. The SNMP settings allow you to set the thresholds that trigger
various SNMP traps. Note that a setting of zero disables the trap.
However, before you can monitor FortiAuthenticator system information and receive FortiAuthenticator traps,
you must do the following:
• Configure one or more interfaces to accept SNMP connections. This allows a remote SNMP manager to
connect to the Fortinet agent. You can enable SNMP connections by enabling the SNMP service on the
required interface.
• Download the Fortinet and FortiAuthenticator MIB files for your SNMP manager. A MIB is a text file that
lists the SNMP data objects that apply to the device to be monitored. These MIBs provide information that
the SNMP manager needs to interpret the SNMP trap, event, and query messages sent by the
FortiAuthenticator SNMP agent. You can download the MIB files on the SNMP page on the GUI or from
the Customer Service & Support portal at https://support.fortinet.com. They are located in the
Firmware Images folder for the FortiAuthenticator product.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Now, you will review the objectives that you covered in this lesson.
DO NOT REPRINT
© FORTINET
This slide shows the objectives that you covered in this lesson. By mastering the objectives covered in this
lesson, you learned about the key features of FortiAuthenticator, and how to configure FortiAuthenticator for
initial setup.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn how to administer user account policies and management settings, and how to
authenticate users through LDAP and RADIUS, as well as the self-service portal.
DO NOT REPRINT
© FORTINET
In this lesson, you will explore the topics shown on this slide.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in creating local users, you will be able to import users, manually add users,
assign user roles, and describe RADIUS attributes.
DO NOT REPRINT
© FORTINET
There are two ways you can add local users to FortiAuthenticator:
• Import users from a CSV file or FortiGate configuration file
• Manually add users
Note that FortiAuthenticator does include a self-service portal, so users can register themselves. Self-
registration is covered in this lesson.
DO NOT REPRINT
© FORTINET
You can import local user accounts from a CSV file or from a FortiGate configuration file, on the Local Users
page.
If you are importing from a CSV file, the file must contain only one record per line in the accepted format. The
accepted format is available in the FortiAuthenticator Administration Guide. If you do not include the optional
password in the record, FortiAuthenticator emails the user temporary login credentials and requests that the
user configure a new password.
If you are importing from a FortiGate configuration file, FortiAuthenticator provides the following options:
• Import users only
• Import users and only their associated FortiToken hardware
• Import all users and the FortiToken hardware (imports unassigned FortiTokens as well)
You must also enter the password associated with the FortiGate configuration file when importing, if one is
assigned.
DO NOT REPRINT
© FORTINET
The other way you can add local users is by manually creating them. You can do this on the same Local
Users page by clicking Create New.
First, you must set a username (253 characters or less and can include only letters, digits, and specific
symbols) and a password. There are three ways to handle the password:
• Specify a password: The administrator assigns a password immediately, and communicates it to the
user.
• Set and email a random password: FortiAuthenticator creates a random password and automatically
emails it to the new user. To use this option, you must enter the email address of the user.
• No password, FortiToken authentication only: No password is assigned because only token-based
authentication will be used. If you select this option, the user account is added, but is disabled until you
associate a FortiToken with the user account. You will learn more about FortiTokens later in this lesson.
• Allow RADIUS authentication: Locally created users will be allowed to authenticate through RADIUS.
DO NOT REPRINT
© FORTINET
After you set the user name and password, you must assign a user role. You can select Administrator to
create an administrator account, or User to create a user account. This lesson focuses on creating end users.
To create an end user, select User as the role. After you select the user role, you can enable account
expiration in the event the user never activates the account or the account is meant to be temporary. You can
set the user account to expire after a set length of time (for example, 8 hours) or by a specific date. After you
add the local user account, FortiAuthenticator provides additional account settings that you can configure.
Similar to administrator users, you can specify additional user account information (address, phone/mobile
number, language, and organization), alternative email addresses, password recovery options, groups, and
email routing.
The Sponsor role is equivalent to an administrator with read-write permissions to the Guest Users submenu
only.
DO NOT REPRINT
© FORTINET
Some RADIUS clients can receive information about users through vendor-specific RADIUS attributes. When
a RADIUS user successfully authenticates, FortiAuthenticator sends the user’s RADIUS attributes and values
to the RADIUS client.
The example shown on this slide passes FirewallAdmins to the client for remote user aduser1 as the
Fortinet attribute Fortinet-Group-Name. As another example, there is a Fortinet-proprietary attribute called
Fortinet-Client-IP-Address. It specifies the IP address assigned to that specific user when establishing an
SSL VPN tunnel. So, you can configure FortiAuthenticator and FortiGate to always assign the same static IP
address to a user. FortiAuthenticator stores the IP addresses as part of the user account information and
sends them to FortiGate, after the user has successfully authenticated.
You can configure RADIUS attributes on the Local Users or Remote Users pages.
DO NOT REPRINT
© FORTINET
You can also configure RADIUS attributes per user group on the User Groups page. In the example shown
on this slide, members of the group Firewall Admin have the Fortinet attribute Fortinet-Group-Name
returned with a value of Remote-AD-admins. If attributes have been set on both a user and group level, the
client will determine how to handle the multiple attributes.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in configuring remote authentication servers, you will be able to describe
remote authentication with LDAP and RADIUS as well as importing remote users.
DO NOT REPRINT
© FORTINET
You can configure FortiAuthenticator to connect to a remote LDAP server on the LDAP page. You must enter
all required information about the remote LDAP server, such as the IP address (or FQDN) as well as the
connecting port. You also have the option to set up a secondary server. When adding the base distinguished
name (dn) of the remote LDAP server, you must use the correct X.500 or LDAP format.
When selecting a bind type, which determines how the authentication information is sent to the server, you
can select:
• Simple, to bind using the user’s password, which is sent to the server in plaintext without a search.
• Regular, to bind using the user’s dn and password and then perform a search. Regular bind is required, if
searching for a user across multiple domains.
You can select a server type and apply an associated template. The template populates the Query Element
fields for that server type.
If you want to have a secure connection between FortiAuthenticator and the remote LDAP server, enable
Secure Connection and include the LDAP server protocol (LDAPS or STARTTLS) as well as any trusted CA
certificates.
DO NOT REPRINT
© FORTINET
You can configure FortiAuthenticator to connect to a remote RADIUS server on the RADIUS page. You can
also use this feature to migrate away from third-party two-factor authentication platforms. Support for RADIUS
over TCP and TLS (RADSEC) ensures complete security.
You must enter all required information about the remote RADIUS server, such as the IP address, port, and
shared secret. You also have the option to set up a secondary server for redundancy.
If you want to record and learn what users are authenticating against this RADIUS server, enable Enable
learning mode in the User Migration section. You should enable this option if you need to migrate users
from the server to FortiAuthenticator.
DO NOT REPRINT
© FORTINET
You add remote LDAP and remote RADIUS users to FortiAuthenticator differently.
For remote LDAP users, you must import users into the FortiAuthenticator user database from their remote
LDAP servers.
You can create remote RADIUS users based on a remote RADIUS server. You can migrate remote RADIUS
users to LDAP users, as well as edit and delete them. You can also flag remote RADIUS users with the user
role or administrator role.
DO NOT REPRINT
© FORTINET
You can import remote LDAP users on the Remote Users page. In the upper-right corner, make sure LDAP
users is selected, and then click Import.
You must select a preconfigured remote LDAP server and then either import users or import users by group
membership.
After FortiAuthenticator connects to your preconfigured LDAP server, you can see your remote users based
on the default LDAP filter (&(objectClass=user)(objectCategory=person)). The default configuration, shown on
this slide, imports the attributes commonly associated with Microsoft Active Directory LDAP implementations.
The filter value varies depending on the LDAP server type. You can also configure the user attributes to edit
the remote LDAP user mapping attributes.
Select the users you want to import. If you have organizations configured, you can choose to add users to a
specific organization.
DO NOT REPRINT
© FORTINET
The LDAP attributes, and the fields they are mapped to, can be defined using the User attributes button. This
provides you the flexibility to customized the attributes being imported.
DO NOT REPRINT
© FORTINET
FortiAuthenticator also allows you to create synchronization rules to control how and when remote LDAP
users are synchronized. You can do this on the Remote User Sync Rules page.
• Select the preconfigured remote LDAP server from where users will be synced.
• Specify the token-based authentication sync priorities. Drag and drop the options up and down the list to
set a priority order.
• Specify whether you want to sync users as remote LDAP users, Remote RADIUS users, or local users.
• Specify if you want to sync FIDO authentication for user accounts.
• Specify how often FortiAuthenticator should perform the sync (for example, every <x> minutes, every <x>
hours, or every <x> days).
When selecting to sync remote users as local users, FortiAuthenticator will create a password for the record.
All other user information will be synched.
You can assign roles to new user accounts, and create a group association.
DO NOT REPRINT
© FORTINET
You can create remote RADIUS users on the Remote Users page. In the upper-right corner, select RADIUS
users, then click Create New.
You need to select a preconfigured remote RADIUS server and create a username for the remote RADIUS
user. You can specify the type of authentication and select the user role to assign to the account, either
Administrator, Sponsor, or User.
Once created, you have the option to perform the following tasks on one or more accounts at the same time:
• Re-enable user accounts in the event they are disabled.
• Migrate RADIUS users to LDAP users.
• Set whether FortiAuthenticator should force token-based authentication (if configured) or whether it should
bypass it.
You also have the option to edit or delete any remote RADIUS user account.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Good job! You now understand how to configure remote authentication servers.
Now, you will learn how to configure LDAP and RADIUS services.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in configuring LDAP and RADIUS services, you will be able to set up the
FortiAuthenticator as a RADIUS or LDAP server.
DO NOT REPRINT
© FORTINET
When you configure the LDAP service on FortiAuthenticator, you must specify the LDAP server certificate
settings on the General page. This includes configuring:
The LDAP User Auto Provisioning settings allow you to select which users are automatically provisioned
(added to), the FortiAuthenticator LDAP directory structure. In the example shown on this slide, the user
user1, was manually created in the GUI as a local user. User1 was then auto provisioned to selected
container in the directory tree. Users can be auto provisioned when they are created using any of the following
four methods:
• GUI (Manually created local users)
• GUI (Imported local users)
• Self-registration
• API
DO NOT REPRINT
© FORTINET
Another item you must configure is the LDAP directory tree. The directory tree includes a root distinguished
name (dn) and subordinate objects such as containers and leafs.
The root dn is the top level of the LDAP directory, such as dc=training,dc=lab, and there can be only one.
Everything else in your directory branches off the root dn. Choose a dn that makes sense for your
organization.
Place subordinate objects under the root dn. The objects you add depend on your requirements. Click the
green plus icon next to the root dn to add objects. In the example shown on this slide, the object is an
organizational unit (ou) container people.
Note that if your organization changes their structure or expands, you can move the branch in the LDAP
directory tree. Click and drag the branch from its current location to its new location.
DO NOT REPRINT
© FORTINET
This is an example of a simple LDAP hierarchy, where all user account entries reside at the organization unit
(ou) level, just below dc.
You must configure the FortiGate device (acting as an LDAP client) requesting authentication to address its
request to the correct part of the hierarchy, where user records exist. This is the distinguished name (dn). In
this example, the dn is ou=people,dc=training,dc=lab.
The authentication request must also specify the particular user account entry. This can be either the common
name (cn) or, on a computer network, the user ID (uid), because that is the information users use to log in.
Note that if the object name includes a space, such as John Smith, you must enclose the text with double
quotation marks. For example: cn=“John Smith”.
DO NOT REPRINT
© FORTINET
You must add user entries at the appropriate place in the LDAP tree. Using the previous example, this would
be under ou=people. In the Class drop-down list, select Local User (uid), and then move the users that
appear in the Available Users list (left) to the Chosen Users list (right). The users must already be defined in
the FortiAuthenticator user database.
DO NOT REPRINT
© FORTINET
After you have defined the LDAP tree, you can configure FortiGate to access FortiAuthenticator as an LDAP
server and authenticate users.
On your FortiGate device, click User & Device > Authentication > LDAP Server, and then create a new
LDAP server with the FortiAuthenticator LDAP server information.
DO NOT REPRINT
© FORTINET
Before getting into the specifics about the RADIUS service on FortiAuthenticator, take a moment to review
what RADIUS is. RADIUS is a standard protocol that provides AAA services.
When a user is authenticating, the client (for example, FortiGate) sends an Access-Request packet to the
RADIUS server (for example, FortiAuthenticator). The reply from the server will be one of the following:
DO NOT REPRINT
© FORTINET
A RADIUS client on FortiAuthenticator is just a network access server (NAS) using a RADIUS infrastructure. It
provides some level of access to a larger network. The client sends connection requests and accounting
messages to a RADIUS server for authentication, authorization, and accounting.
You can add RADIUS clients on the Clients page. FortiAuthenticator sends answers only to the RADIUS
clients on this list. For example, for FortiAuthenticator to accept RADIUS authentication requests from
FortiGate, you must register the FortiGate as an authentication client on FortiAuthenticator. You must include
the IP of the client and the shared secret.
FortiAuthenticator allows both RADIUS and remote authentication for RADIUS authentication client entries.
DO NOT REPRINT
© FORTINET
RADIUS policies allow you to define the way RADIUS client requests are addressed by FortiAuthenticator. A
RADIUS policy can be applied to any number of RADIUS clients, and the RADIUS clients can be assigned to
multiple polices. The RADIUS clients tab provides you the ability to name the policy and select which RADIUS
clients will have their requests processed by that policies settings.
The RADIUS attributes criteria allows you to key on specific attributes within authentication requests before
the request is processed. The request can then be ignored, if it does not contain the required attributes.
DO NOT REPRINT
© FORTINET
You can include RADIUS clients in any number of RADIUS policies, and you can prioritize policies. Matching
RADIUS attributes can provide granularity during policy evaluation. The RADIUS request is processed as
defined by the matching policy with the highest priority. You can adjust the policy priority by clicking the
arrows in the Priority column.
In the example shown on this slide, users authenticating through M-FortiGate-1, and connecting to the
Contractor SSID, would have their credentials validated based on the ManchesterContractor policy. All
other users connecting through that FortiGate would get the ManchesterPolicy. All users connecting through
the Corp-FortiGate would be authenticated using the Fortigate_Default policy.
DO NOT REPRINT
© FORTINET
The Authentication type tab allows you to set the desired security protocol to one of the following:
• Password/OTP authentication: Allows for password or one time password (OTP) authentication. EAP
can be enabled for this option and limited to one or more EAP protocols (PEAP, EAP-TLS, EAP-GTC,
EAP-MSCHAPv2)
• MAC authentication bypass (MAB): Provides the option to authenticate based on MAC address, and can
offer a solution for non-802.1x capable devices.
• Client Certificates (EAP-TLS): Provides authentication through client certificates.
The Identity source tab can define the username format and any desired realms. Groups can be filtered for a
more granular end user designation.
Note that If you want to authenticate users in an Active Directory environment, enable the Windows Active
Directory Domain Authentication option on the LDAP server configuration screen and enter the required
Windows AD domain controller information. You can then configure your RADIUS client to specify whether
authentication is available for all Windows AD users, or only for Windows AD users who belong to specific
groups that you select.
DO NOT REPRINT
© FORTINET
The Authentication factors tab provides you the ability to define the allowed authentication methods, and the
RADIUS response tab summarizes the configuration for successful and failed results.
DO NOT REPRINT
© FORTINET
The FortiAuthenticator RADIUS service also employs the concept of realms. Realms allow multiple domains
to authenticate to a single FortiAuthenticator device and support both LDAP and RADIUS remote servers.
Each realm is associated with a name, such as a domain or company name, that is used during the login
process to indicate the remote (or local) database in which the user resides.
For example, if you are a service provider that hosts multiple domains and you want each domain to have
different permissions, you can set up a realm on FortiAuthenticator for each domain. So even though each
domain is using the same RADIUS client, realms allow you to control access and permissions.
DO NOT REPRINT
© FORTINET
The connection between RADIUS clients and the server used for authentication is defined by the RADIUS
policy. The diagram shown on this slide visually represents the relationship. It illustrates that the RADIUS
client points to FortiAuthenticator, and based on the RADIUS policy, FortiAuthenticator validates the
authentication request. RADIUS policy-3 has been configured with multiple realms, and the AD realm has
been further filtered to a specific group. Users without a realm appended to the user name are authenticated
against the default realm (internal DB). Users with the AD realm appended to the username, are authenticated
against the Active Directory, and must be a member of the designated group (StandardUsers).
DO NOT REPRINT
© FORTINET
You can designate the ports FortiAthentictor uses for the different RADIUS services. The example shown on
this slide displays the default values.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Now, you will review the objectives that you covered in this lesson.
DO NOT REPRINT
© FORTINET
This slide shows the objectives that you covered in this lesson.
By mastering the objectives covered in this lesson, you learned how to administer user account policies and
management settings, and how to authenticate users through LDAP and RADIUS as well as the self-service
portal.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn how to manager user account policies and management settings, , configure the
self-service portal, and troubleshoot authentication issues.
DO NOT REPRINT
© FORTINET
In this lesson, you will explore the topics shown on this slide.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives on this slide.
By demonstrating competence in configuring user account policies, you will be able to understand the lockout
policy settings, password policy settings, and configure the custom user fields.
DO NOT REPRINT
© FORTINET
On the General Settings page, you can configure some user account settings. You can:
• Automatically purge disabled user accounts at a scheduled time (for example, weekly at 2 AM) and purge
users that were disabled for any of the following reasons: They were manually disabled, they were
inactive, or their account expired.
• Discard stale RADIUS authentication requests.
• Look up geo-location based on user IP address.
DO NOT REPRINT
© FORTINET
FortiAuthenticator allows you to lock a user account after repeated unsuccessful attempts to log in, which may
indicate an attempt at unauthorized access. You can configure the lockout policy settings on the Lockouts
page by selecting Enable user account lockout policy setting. By default, users are locked out after three
failed login attempts. If you decide to change the default value, ensure it provides room for human error, while
still securing your network from attacks. Usually, from three to five attempts are used. It is advised to enable a
lockout policy.
Along with enabling a lockout policy, you have the option to specify a lockout period. The default is set to 60
seconds (that is, users are locked out for 60 seconds after three failed login attempts), but you can set it to
between 60 and 86,400 seconds. If you disable this setting, FortiAuthenticator permanently disables locked-
out users until an administrator (with appropriate permissions) manually re-enables them.
Finally, you can disable user accounts if there is no login activity for a specified number of days. If you enable
this setting, you must specify the number of days a user account can be inactive before being locked out. The
inactive user lockout period must be between 1 and 1825 days.
You can monitor your top locked-out users on the dashboard, in the Top User Lockouts widget. You can
view currently locked-out users on the Locked-out Users page.
DO NOT REPRINT
© FORTINET
For security purposes, you may also want to enforce password complexity for user passwords, as well as
force users to change their passwords after a specified time has passed.
You can configure the password policy settings on the Edit Password Policy page.
DO NOT REPRINT
© FORTINET
FortiAuthenticator allows you to create custom fields that you can use to gather user information not
represented by the default fields.
You can configure the custom fields on the Custom User Fields page. Click the Edit icon associated with the
custom field and enter your custom field in the text box that appears. The custom field will appear in the User
Information portion of local user records, and can be populated by users during self-registration.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Good job! You now understand how to configure user account policies and management settings.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in configuring the self-service portal, you will be able to configure the self-
service portal and replacement messages, and set up user self-registration.
DO NOT REPRINT
© FORTINET
In order to allow users to self register, you must first configure the self-service portal. Users must access the
portal to complete various self-service tasks. You can configure the general settings of the portal on the portal
page. These include:
DO NOT REPRINT
© FORTINET
Pre-Login services allow you to define the services available to a user before login. A disclaimer can be
presented to the end user, and they must accept it before proceeding to the login page. The disclaimer can be
customized in the Login Disclaimer Page under the Replacement Messages view. You can also provide the
users with a password reset link in the event they have forgotten their password.
To enable users to request registration through the FortiAuthenticator login page, you must enable the
Account Registration pre-login service option.
After you enable self-registration, you are presented with configuration options for the self-registration
process. For example, you can:
• Specify mandatory administrator approval for every self-registration.
• Set the account to expire after a specified period of time.
• Set the user’s mobile number as their user name.
• Place users in a pre-defined group.
• Specify how the user password is created (user defined or randomly generated).
• Specify how the account information is sent to the user (SMS or email).
o If administrator approval is not required, you have the option to display the account information on
the browser page.
In the Required Field Configuration section, you can also specify which information-gathering fields are
required when a user registers (for example, first name, last name, and email address), and can include any
custom user fields.
DO NOT REPRINT
© FORTINET
You can grant users the ability to perform self-revocation and reprovisioning of tokens, directly from the user
portal. The user portal includes a link for this capability. Users can revoke FortiToken and FIDO tokens and
use other OTP options.
The Usage Extension Notifications option allows a user who has exceeded their allowed time or data usage
settings to request an extension.
DO NOT REPRINT
© FORTINET
Post-login services provide the users the ability to manage many aspects of their account. They include the
following:
DO NOT REPRINT
© FORTINET
Replacement messages are customized messages FortiAuthenticator sends to users upon self-registration.
You can view and customize the default messages on the Replacement Messages page. You may need to
do this based on your self-service configuration. For example, on the pre-login services view you learned that
administrators can specify which information-gathering fields they want to display to the user when they self-
register. The default self-registration message may include fields asking for information you didn’t ask for from
the user. As such, you have to remove those fields from the message.
To customize, select the default message and edit the plain text or HTML code. You can always restore the
default message, if required.
On this page, you can also manage images you want to include in the message. For example, you can
manage your company logo or images containing links to your company’s social media pages.
DO NOT REPRINT
© FORTINET
On the Policy type page, you specify a name for the portal policy, an optional description, and the portal to
associate with the policy.
On the Identity sources page, you can configure which users or groups can access the network. You must
specify:
• The input format for the user name. Options include username@realm, realm\username,
realm/username. The realm name is optional when authenticating against the default realm.
• The realm(s) with which the user will be associated. This is the default realm for this client. You can add
additional realms by clicking Add a realm. Note that you must have preconfigured these realms.
• Whether to allow local users to override remote users.
You can use the group filter to filter users based on group membership.
DO NOT REPRINT
© FORTINET
The Authentication factors page is where you specify which authentication factors to verify by selecting one
of the following options:
• Mandatory password and OTP: Requires two-factor authentication.
• All configured password and OTP factors: Two-factor authentication is necessary if it is enabled on the
user’s account.
• Password-only: Does not require two-factor authentication.
• OTP-only: Token verification only.
• Adaptive Authentication: Users can bypass OTP validation if they belong to a trusted subnet.
• FIDO authentication (effective once a token has been registered): Once a user has a Fast ID Online
(FIDO) token registered they can be required to log in with only the FIDO token or both a password and the
FIDO token.
The Advanced options provide the option to leverage FortiToken push notifications, resolve users’
geolocation based on their IP address, and reject usernames containing uppercase letters.
DO NOT REPRINT
© FORTINET
The post-login options you configured on the portal appears after a user successfully authenticates. By
default, the options appear as buttons. The example shown on this slide is a portal with each of the five post-
login options enabled:
• Profile
• Password Change
• Token Registration
• Device Tracking and Management
• Smart Connect
DO NOT REPRINT
© FORTINET
Step 1: A user must connect HTTP or HTTPS to the FortiAuthenticator GUI. When self-registration is enabled,
the access login page shows a Register link.
Step 2: After clicking Register, the user is presented with a form with information-gathering fields, such as
username, name, email and so on. If you did not configure FortiAuthenticator to randomly generate
passwords, the user must also specify a password.
Step 3a: If FortiAuthenticator is configured so that administrator approval is required for self-registrations, the
administrator receives an email that contains a link to the new user request (with filled-out form) and the
option to either approve or deny the registration.
Step 3b: After the account is approved (whether by an administrator or automatically), the user will receive a
confirmation through the medium you specified while configuring the self-service portal. This could be email,
SMS, or, if no administrator approval is required, on the browser page. If you configured FortiAuthenticator to
use randomly generated passwords, the email or SMS confirmation will contain the user password.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Good job! You now understand how to configure the self-service portal.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in troubleshooting, you will be able to debug using the FortiAuthenticator logs
and extended logs.
DO NOT REPRINT
© FORTINET
On the Logs page on the GUI, you can find the normal level of debugging required for everyday use. Log
types include:
You can also download a debug report, which is encrypted, and send it to the FortiAuthenticator team for
further investigation, if necessary.
DO NOT REPRINT
© FORTINET
This slide shows some example logs for portal login and RADIUS login, with both user name and password as
well as token.
DO NOT REPRINT
© FORTINET
In the Service drop-down list, you can select the service from which you want to gather logs. The RADIUS
authentication service allows you to enable verbose logging by clicking Enter debug mode. This has a
performance impact, so remember to turn it off.
The max log file size can be selected from a list ranging from 200 KB and 500 MB. The logs is displayed in
pages, with the number of entries defined by the user. Clicking the download icon will download log.
DO NOT REPRINT
© FORTINET
If your logs do not go back as far as you want, check the Log Settings page for your log configuration. You
may have set them to automatically delete. However, if you configured your logs to remotely back up to an
FTP server or syslog server, you may be able to find your history logs there.
DO NOT REPRINT
© FORTINET
When debugging RADIUS issues, ensure you verify the user configuration on the User Management page.
Check whether the account has been accidentally disabled. Also check whether the correct token is assigned
to the user. You may want to disable the token to rule out any issues.
By default, RADIUS authentication is enabled, but you can disable it per user.
DO NOT REPRINT
© FORTINET
Another thing to check is the RADIUS client configuration. Verify that the secret and RADIUS client IP are
correct? Remember, the IP could be changed if you are using NAT.
DO NOT REPRINT
© FORTINET
Another thing to check is the RADIUS policy configuration. Here are some things to consider:
• Is the correct realm being authenticated? Try allowing local user override and testing with a local user.
• Are there any group filters in place? Try removing and testing again.
• Are you using MSCHAPv2 in place of PAP, and an external active directory (AD)? If so, make sure to
enable Use Windows AD domain authentication.
• Are you using RADIUS attributes to assign different RADIUS policies? It’s often helpful to walk through
each step of the policy to validate settings.
• Is two-factor authentication enforced when the user has no token?
DO NOT REPRINT
© FORTINET
If you are still experiencing issues with RADIUS, there are three steps that you should take.
The first step is to verify whether traffic is reaching FortiAuthenticator. Use the various tcpdump commands in
the CLI. Then, if no traffic is reaching FortiAuthenticator, validate the intervening firewall policies and the
RADIUS client configuration.
DO NOT REPRINT
© FORTINET
The second step is to check the log files. Try the following recommendations if any of the following scenarios
occur:
• Authentication attempt fails with no log entry: In this case, check that your RADIUS client is correctly
configured to send authentication to FortiAuthenticator. Also verify traffic is reaching FortiAuthenticator and
is not prevented by a firewall policy.
• Authentication attempt fails with “Invalid Password”: In this case, reset the user password and try again. If
it still fails, verify the network access server shared secret.
• Authentication attempt fails with two-factor authentication enabled: In this case, verify the user is not trying
to use a previously used token passcode (for example, a one-time password token). Also verify the time
and time zone on FortiAuthenticator is correct and preferably synchronized using NTP. Finally, verify the
token is correctly synched with FortiAuthenticator (that is, it hasn’t drifted).
You may also want to check the extended logs as well at http://<FortiAuthenticator_IP>/debug.
DO NOT REPRINT
© FORTINET
The third step is to reduce the complexity of the RADIUS configuration. Usually this is not required, because
the logs provide enough information for troubleshooting purposes. However, just in case try, the following:
• Remove two-factor authentication from the equation by disabling the token in the user account
• Remove any group filters
After the complexity is reduced, test authentication using a simple client tool, such as NTRADPing, from a
laptop. Don’t forget to add the laptop as an allowed RADIUS client in the FortiAuthenticator configuration!
DO NOT REPRINT
© FORTINET
The following slides show some common issues for RADIUS login failures. In the scenario shown on this
slide, the user exists on the system, but RADIUS authentication fails. Logs say Authentication failed,
user not found.
To debug, verify the user has RADIUS authentication enabled and that the account is not disabled.
DO NOT REPRINT
© FORTINET
In the scenario shown on this slide, the user exists on the system, but RADIUS authentication fails. Logs show
no success or failure.
To debug, verify that a RADIUS client entry exists for the authenticating system and that the traffic is really
sourced from the IP of the network access server and is not being NATed. Also check the RADIUS log for
errors and sniff the traffic.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Now, you will review the objectives that you covered in this lesson.
DO NOT REPRINT
© FORTINET
This slide shows the objectives that you covered in this lesson.
By mastering the objectives covered in this lesson, you learned how to administer user account policies and
management settings, and how to authenticate users through LDAP and RADIUS as well as the self-service
portal.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about two-factor authentication and FortiTokens. Specifically, you will learn how to
provision, create, and administer FortiTokens for use as your step-up authentication solution.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about the topics shown on this slide.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating knowledge of password tokens and validation servers, you will be able to use them in your
network.
DO NOT REPRINT
© FORTINET
Typically, an OTP token is not used as a standalone solution, but as an additional authentication mechanism on
top of a user name and static password—the something you have in two-factor authentication.
OTP tokens generate passwords that can be used only once. They are more secure than static passwords
because they are not vulnerable to replay attacks. For example, even if an attacker obtains an OTP, the
password invalidates after a short interval (usually 60 seconds).
Because memorizing OTP passwords is practically impossible, you need something that can generate OTPs for
you. There are three main ways of acquiring one-time passwords:
• Hardware tokens, which are physical devices, such as the FortiToken 200 series
• Software tokens, which are software applications on a smart phone, such as FortiToken Mobile
• FortiToken Cloud uses cloud-based token validation using FortiToken Mobile
• Tokenless (email or SMS)
DO NOT REPRINT
© FORTINET
There are two main standards, governed by OATH, to generate one-time password tokens: time-based and
event-based.
TOTPs generate passcodes using a combination of time (time passed since an epoch) and a secret key. The
passcode changes at regular intervals and, because they are OTPs, are single use only. FortiAuthenticator
validates the entered passcode using time and the secret key. Fortinet products that use TOTP include
FortiToken 200 (hardware token) and FortiToken Mobile (software token). With time-based tokens, it is important
to have FortiAuthenticator’s system clock accurately adjusted. Therefore, it is highly recommended that you use
an NTP server for system time synchronization.
HOTPs generate passcodes using a combination of a counter (an input to a cryptographic hash function) and a
secret key. Whenever a new passcode is generated, the counter value is incremented, and therefore the
passcodes are different each time. They remain valid until used. Because they are OTPs, the passcodes are
single use only.
TOTP is considered more secure because the passcode keeps changing and is only valid for a short period of
time. HOTP passcodes can be valid for an unknown amount of time (they remain valid until used).
DO NOT REPRINT
© FORTINET
This slide shows the details of how tokens are used within a two-factor authentication environment.
1. The token generates a passcode. The passcode is based on a seed, which is a randomly-generated number
that does not change in time, and a time, obtained from an internal, accurate clock. The seed and time go through
an algorithm that generates a passcode. A single passcode is valid for only a short interval (usually 60 seconds)
and then a new one generates. The cycle of generating passwords repeats over and over again.
2. The user authenticates through a username and static password (first factor), and then the one-time passcode
provided by the token (second factor).
3. A validation server receives the username and static password and validates those credentials.
4. The validation server then validates the OTP. The validation server knows the seed used by the token and its
system time is synchronized with the time in the token. By using the same algorithm, the validation server can
generate the code again and compare it with the one received from the user. If the static password is valid and
the one-time passwords match, the user is successfully authenticated. Again, both the token and the validation
server must have the same seed. Also, both system clocks must be synchronized (this is why an NTP server is
highly recommended).
DO NOT REPRINT
© FORTINET
RADIUS authentication is a method used by a RADIUS client delegating authentication (and sometimes
authorization) to a third-party user database; that is, the RADIUS server. In RADIUS authentication there are
usually three parties: the user, the RADIUS client or NAS (which is usually a FortiGate or another network access
device), and the RADIUS server. When the user authenticates, the RADIUS client requests the users credentials
and passes them to the RADIUS server for validation.
In most cases, the RADIUS client will support a RADIUS challenge-response. The RADIUS challenge-response
method is the preferred mechanism for two-factor authentication, because it is most natural for the end user.
If the RADIUS client supports the use of the RADIUS challenge packet, the remote user authenticates by entering
the username and password first, which is then forwarded by the RADIUS client to the RADIUS server. The
credentials are validated and, if correct and two-factor authentication is required, the RADIUS server replies with
an access challenge message indicating to the RADIUS client that it must ask the user for the token passcode.
The user now sends the one-time passcode, which is also forwarded to the RADIUS server for validation. The
RADIUS server also calculates the one-time passcode, compares it with what is provided, and replies with
“access accept” or “access reject”.
OTP passcode appended method can be used when the RADIUS client does not support the RADIUS challenge
packets, which is sometimes the case in old or legacy systems, the user must type and send the static password
and the token code all together. The user must know to append their OTP passcode to the end of their password.
The RADIUS client forwards those credentials to the RADIUS server, which replies with an answer indicating if
the password and the token code are valid or not.
DO NOT REPRINT
© FORTINET
PUSH notifications are used to send alerts to the end user’s device each time a login request is made.
The alert contains information about the login attempt, for example the location from which the attempt originated.
Using FTMv4, when required to authenticate themselves, FortiToken Mobile users don't have to look up a code in
FortiToken and enter the code into their browser.
Instead, FortiToken Mobile is queried and the user simply taps to approve or deny the request.
If approved, a new OTP is automatically generated and sent by FortiToken Mobile to transparently authenticate
the end-user in the background.
DO NOT REPRINT
© FORTINET
To some extent, FortiGate (without FortiAuthenticator) does support two-factor authentication. So, what are the
benefits of using FortiAuthenticator for two-factor authentication?
FortiGate has a built-in validation server and can also integrate with an existing AD/LDAP infrastructure.
However, and by design, the scope of two-factor authentication without FortiAuthenticator is specific and limited
to one instance of FortiGate (or HA pairs). So, it works well only in cases where tokens are stored on only one
FortiGate device.
FortiAuthenticator can support multiple FortiGate devices or other third-party vendor devices. With
FortiAuthenticator, one FortiToken can be used to authenticate to multiple systems.
Other advantages are that FortiAuthenticator has a built-in LDAP server and an API for integrating authentication
services within a corporate Web site or application. It also supports wireless authentication through social
channels, extends guest management capabilities, and delivers certificate management.
FortiToken Cloud provides a high availability managed service for two factor authentication that allows
administrators to easily deploy and manage their token inventory. Support for FortiToken Mobile Push simplifies
end user interaction during two factor authentication. FortiToken Cloud also adds the benefit of two factor
authentication across multiple FortiGates with a single token.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in explaining hardware and software tokens, you will be able to use them
knowledgeably in your network.
Fortinet has a USB smart card token that can be used for two-factor authentication as well. However, since the
USB smart card token uses an x.509 certificate for authentication (rather than an OTP), it is described in the
Certificate Management lesson.
DO NOT REPRINT
© FORTINET
This slide shows the FortiToken hardware device options: FortiToken 200B and FortiToken 220. They each
generate tokens that expire after 60 seconds. After the current interval expires, the devices transition to sleep
mode to save battery life.
The benefits of the FortiToken 200B and 220, compared to third-party devices, is that the tokens are perpetual
and will function for as long as the battery remains functional (unlike RSA tokens, for example, which expire after
a fixed period).
DO NOT REPRINT
© FORTINET
The FortiToken 200B is a small keychain-sized hardware token that provides easy-to-use single-button token
generation. The token is displayed on a large easy-to-read LCD screen, with an indicator that shows the time
remaining before the next token is generated.
The FortiToken 220 is a mini credit card format FortiToken, that like the FortiToken 200B, provides easy-to-use
single-button token generation. The token is displayed on a easy-to-read LCD screen, with an indicator that
shows the time remaining before the next token is generated.
DO NOT REPRINT
© FORTINET
FortiToken Mobile is installed on any Android or iOS mobile device as an app. It is a PIN-protected application
that displays the 6-digit or 8-digit code on the user’s mobile phone in 30-second or 60-second timesteps (the
default is 60 seconds). The application stores the seed encrypted, and it can be configured to erase the seed
when the number of failed PIN attempts exceeds a threshold.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in provisioning both hardware and software tokens, and configuring users for two-
factor authentication, you will be able to use both in your network.
DO NOT REPRINT
© FORTINET
These are the steps that an administrator must follow to provision any new token:
1. Obtain token data which consists of the serial number and seed.
2. Register or add the tokens on the validation server.
3. Assign tokens to users.
4. Configure users for two-factor authentication.
Remember, the validation server can be either FortiGate or FortiAuthenticator, depending on your requirements.
You will learn about these steps in detail in this lesson, using FortiAuthenticator as the validation server.
DO NOT REPRINT
© FORTINET
Because the first step involves obtaining the token data, which includes the seeds, let’s quickly examine token
seeds. A seed is a factory-encoded random key, which, along with the built-in clock, generates the authentication
code.
The seed for the FortiToken 200 is generated randomly and is 160 bits long. After the seed is generated, it is
encrypted using 2048-bit RSA and stored in a secure database. The system automatically injects the seeds into
the tokens, so the seed number is never exposed to human operators. Upon request from a customer, the seed
can be destroyed.
FortiToken Mobile includes seeds as well. FortiToken Mobile seeds are generated on demand when the token is
provisioned to the user on the FortiGate or FortiAuthenticator. When a provisioning request is received, a random
data source is used to generate the seed and store it, encrypted, until it is securely retrieved by FortiAuthenticator
and the user’s FortiToken Mobile application. After it is retrieved, the seed is irretrievably destroyed on
FortiGuard. If the seed is not downloaded within the designated time frame (up to 30 days), it is automatically
destroyed.
When you use FortiAuthenticator, FortiAuthenticator generates the seed and then pushes it to the cloud.
DO NOT REPRINT
© FORTINET
Once the token is seeded, the token data (serial number and seed) must be delivered to the validation server
administrator.
You can receive the token data in the following two ways. The second method is the more secure of the two.
• Activate encrypted seeds online through the FortiGuard network. To reduce the impact of entering all token
seeds, all tokens associated with a purchase order can be imported in bulk by entering a single token serial
number. Alternatively, you can scan the barcode on the back of each token using a barcode scanner.
• Generate and provision the seeds in-house using a token provisioning tool. This in-house method is intended
for high-security organizations that want to have full control of the seeds as soon as they are generated. With
this method, Fortinet ships blank tokens with no seeds. You must inject the seeds within your secure
premises, which requires a seed-injection system and a hardware token seed-burning system. This can be a
time-consuming process, but it is highly customizable and secure.
DO NOT REPRINT
© FORTINET
You must register any new token—either the FortiToken hardware or FortiToken Mobile—with FortiAuthenticator.
You can do this through the FortiToken page.
There are two ways you can add tokens to FortiAuthenticator: manually create them or import them.
To manually create tokens, click Create New. If you are registering a FortiToken hardware, you need to enter the
serial number. If you are registering FortiToken Mobile, you need to enter the activation code. If you have multiple
tokens, you must add them one at a time, or you can add all tokens from the same purchase order by enabling
Add all FortiTokens from the same Purchase Order.
To import tokens, click Import. You can import by serial number file (CSV), seed file (CSV), or FortiGate
configuration file.
The Serial number file is a CSV file that contains the token serial numbers. FortiToken devices have a serial
number barcode on them that is used to create the import file.
The Seed File is a CSV file that contains the token serial numbers, encrypted seeds, and IV values.
The FortiGate configuration file provides you the ability to import FortiToken Hardware only, FortiToken
Hardware and only their associated users, or Import all FortiToken Hardware and users. The selected
option will be extracted from the uploaded FortiGate configuration file.
Each time you register new FortiTokens, the connectivity between FortiAuthenticator and FortiGuard must be up,
because FortiAuthenticator needs to validate each FortiToken against the FortiGuard servers. FortiAuthenticator
requires full Internet connectivity (through port 443) and proper DNS resolution. After the FortiTokens are
registered, the connection to FortiGuard is no longer essential.
DO NOT REPRINT
© FORTINET
You can assign a token to a local user or remote user on the User Management page. Enable Token-based
authentication and select FortiToken. From here, you can select Hardware, Mobile, or Cloud. For hardware or
mobile you select the token from a drop-down list, remember, the token must first be registered with
FortiAuthenticator.
For local users only, you can choose to send a temporary passcode for a FortiToken Hardware or FortiToken
Mobile over email, SMS, or both. This allows you to assign a temporary authentication method, should a user
temporarily misplace their token or leave it at home without the need to de-provision the old token method.
DO NOT REPRINT
© FORTINET
Once you assign a FortiToken hardware to a user, that FortiToken is ready to use. It should be delivered to the
user safely and your company should have a vetting process in place to ensure the correct person is receiving
the assigned token. An organization’s policy for hardware token delivery is outside the scope of this training.
Once the user physically has the token and attempts to access a protected resource on the network, the user is
prompted to enter their token code. The user must press the button on the FortiToken hardware to display the
code.
DO NOT REPRINT
© FORTINET
If you assign a FortiToken Mobile (soft-token) to a user, the process of user activation is as follows:
DO NOT REPRINT
© FORTINET
Before provisioning the first FortiToken Mobile app, go to the FortiGuard page and select the required activation
timeout, token size, PIN length, and algorithm. The default Token algorithm is TOTP (Time-based One-time
Password) with default time step of 60 seconds. The time step defines the time between token generation. The
Hash-based One-time Password (HOTP) algorithm option will generate a single use token.
DO NOT REPRINT
© FORTINET
You can also customize the FortiToken Mobile app with your organization’s logo. First, you must configure your
organization’s logo on the Logos page. Then, you can assign it to the user. Edit the user entry on the User
Management page (either local or remote user), and, in the User Information section, select the logo in the
FortiToken Logo drop-down list. The logo will then appear on the FortiToken Mobile app.
DO NOT REPRINT
© FORTINET
As mentioned, once you assign a FortiToken Mobile to a user, the user receives an SMS or email with
instructions. Note that the user account must include a valid mobile phone number or email address.
This slide shows an example of the email that is sent. The email includes a link to the FortiToken Mobile User
Guide for either iOS or Android, the activation code, and a QR code containing the activation code for easier
activation. The email also includes a time by which the user must activate the token. If not activated before expiry,
the user must contact the administrator to receive a new activation code. In this lesson, you will learn how to
modify the passcode validity time.
The user must open the FortiToken Mobile application on their iOS or Android mobile device and enter the
activation code. The application will then contact FortiGuard to validate the activation code.
DO NOT REPRINT
© FORTINET
FortiToken Cloud provides Authentication as a Service (AaaS), centralizing management, provisioning, and token
authentication in the cloud. This provides you an additional option, beyond local, for two-factor authentication as
well as cloud-based SSO. It provides FTM push without the need to open firewall ports, and cross-platform token
transfer. FortiToken Cloud works with FortiAuthenticator and does not interfere with the initial user name and
password login process. No additional hardware or software is required. The cloud-based service offers high
availability.
DO NOT REPRINT
© FORTINET
If you assign a FortiToken Cloud to a user, the process of user activation is as follows:
DO NOT REPRINT
© FORTINET
In addition to the hardware and software tokens, FortiAuthenticator can deliver a one-time password (or token
code) by either email, SMS or both. If email is used as a delivery method, you need to ensure you have
configured the user account to include a valid email address. If SMS is used as a delivery method, you need to
ensure you have configured the user account to include a valid mobile phone number. This slide shows an
example of the delivery of a token code by email.
DO NOT REPRINT
© FORTINET
Just because a user is assigned a FortiToken and they have registered or activated it, does not mean they must
use it as their step-up authentication method. You must enable two-factor authentication on FortiAuthenticator
first. You can do this on the User Management page by enabling both Password-based authentication (this
will be used as the first factor) and One-Time Password (OTP) authentication (this will be used as the second-
factor).
DO NOT REPRINT
© FORTINET
You can configure two-factor authentication for RADIUS authentication requests from a RADIUS client. There are
four authentication methods available. They are:
Mandatory password and OTP: If the user does not have a token, they cannot be authenticated for this client.
This is the most common method used to enforce secure authentication.
All configured password and OTP factors: If the user has a provisioned token, it must be used. If the user
does not have a token, they can still log in. This authentication method is used in a mixed environment where
only certain high-risk users need to authenticate with two-factor authentication. You can also use it in combination
with RADIUS attributes, where RADIUS attributes are used to elevate user permissions and only those users
require secure authentication.
Password-only: Removes the need for use of the token passcode even if it is provisioned. This method is used
in low-risk situations where added security is not required for the specific client. This method is not recommended
and should be used use with caution.
OTP-only: This authentication method validates only the token passcode. Entering the password will fail and a
challenge will not be made. This method is used where the first factor (username and password) is validated
externally, for example, for integration with a banking web application where username and password are
validated against a separate SQL or other type of database.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in token-related tasks, such as configuration, synchronization, and monitoring, you
will be able to effectively manage FortiTokens.
DO NOT REPRINT
© FORTINET
On the Tokens page, you can configure various token settings for both time-based and event-based tokens. For
example, you can:
• Set a time window (or counter window for event-based tokens) so that a FortiToken code will be marked as
valid inside the window. For example, if the field is set to 1 minute, the token code that is issued in the last,
current, or next minute is considered valid.
• Set a sync window (or counter window for event-based tokens) so that, if a FortiToken code is invalid but is
still inside this window, it will be marked out of synchronization.
• Set the length of time after which a token passcode sent by email or SMS will be marked as expired.
• Offline support allows Windows agents to cache future-dated tokens for when the end station is offline.
• Emergency codes help users without access to FortiToken, SMS, or email to complete 2FA. They can be
supplied to the user by an administrator.
You can reduce security by changing these settings. For example, by changing the time-based valid window from
1 minute to 100 minutes, you would increase the chance of being able to guess a token from 1/1,000,000 to
100/1,000,000 or 1/1,000. Use caution when changing this setting.
DO NOT REPRINT
© FORTINET
The system clock in the token must be synchronized with the system clock in FortiAuthenticator. Perfect
synchronization is always impossible to achieve. There is always a difference, called a drift, between the two
clocks. The drift usually increases with time, causing both device clocks to become out of sync.
A time step (which is equivalent to the frequency that a new code is generated) is 60 seconds. FortiAuthenticator
will accept the valid code for the current time step, the one before, and the one after. So, any drift that is not
bigger than +/-1 time step is tolerated. If the drift is larger, a re-synchronization is required. This ensures that the
device provides the token code that FortiAuthenticator expects, because the codes are time-based. Fortinet
recommends synchronizing all new FortiTokens.
You can re-synchronize a FortiToken on the FortiToken page. Locate the FortiToken you want to synchronize
and click Synchronize. You must enter the code currently displayed on the FortiToken, wait for a new time step,
and then type the next code displayed. In this way, FortiAuthenticator can calculate the drift and adjust
accordingly.
DO NOT REPRINT
© FORTINET
Remote user synchronization rules allow you to configure token-based authentication sync priorities, how and
when remote LDAP users are synchronized, and the role assigned to the imported users. The prevents the
administrator from having to assign tokens to users one at a time.
You can enable the Token-based authentication sync priorities setting, and then prioritize the entries by
dragging them up or down in the list.
You can assign the new user imports FortiAuthenticator the role of Administrator, Sponsor, or User.
Enable Email password recovery to provide an email password recovery option to new and existing remote
LDAP users, if they have a valid email address.
You can delete synchronized users when they are no longer found on the remote server. This option is available
only when the Proceed with rule even when response is empty option is not enabled.
Enabling the Proceed with rule even when response is empty will result in the deletion of all users in a
FortiAuthenticator group when the synchronization returns no results.
DO NOT REPRINT
© FORTINET
The User Inventory widget on the FortiAuthenticator dashboard indicates the total number of registered
FortiToken devices and the total number of disabled FortiTokens.
DO NOT REPRINT
© FORTINET
You can export FortiTokens to a CSV file on the FortiTokens page by clicking Export FTK Hardware.
Tokens are removed from FortiGuard once provisioned, so it is not possible to reprovision them onto another
system without opening a support ticket. By providing an export option, you can reprovision tokens without
needing additional support. Furthermore, it is currently not possible to import configuration backups from different
appliance models. So the ability to export tokens (and users) allows for easy migration between systems.
DO NOT REPRINT
© FORTINET
Changing devices requires the user to install new tokens on their new device because the unique device ID is
used to form the seed decryption key.
If you wipe data from your device, or upgrade your device, you must reprovision your accounts.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
If a user reports a FortiToken lost or stolen, you can lock the FortiToken. Select the FortiToken on the
FortiTokens page and click Lock. You must provide a reason for locking the FortiToken. A temporary SMS or
email token can be provided to the user for logging in until new arrangements have been made. The device can
be unlocked if it is recovered.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Now, you will review the objectives that you covered in this lesson.
DO NOT REPRINT
© FORTINET
This slide shows the objectives that you covered in this lesson.
By mastering the objectives covered in this lesson, you learned how to apply and manage two-factor
authentication using tokens.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn how to use FortiAuthenticator as a login event collector that uses the Fortinet Single
Sign-On (FSSO) communication framework to transparently authenticate users.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about the topics shown on this slide.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in understanding FSSO, you will be able to identify the different methods of
collecting login events from AD as well as understand the FSSO framework.
DO NOT REPRINT
© FORTINET
FSSO offers a solution for transparently identifying (and implicitly trusting) users who have already authenticated
to the network through a different system.
FSSO differs from the generic single sign-on (SSO) in that FSSO is a single sign-on into the FortiGate firewall
policy only, as opposed to a single sign-on into any web or similar application.
FSSO is commonly used to transparently authenticate Microsoft AD users, but with FortiAuthenticator, it is not
limited to that environment. FSSO can also transparently authenticate users in non-Microsoft environments by
leveraging the Fortinet mobility agent, syslog SSO, and SAML SSO.
DO NOT REPRINT
© FORTINET
1. The user authenticates only once, against an authentication server that is usually a Windows Domain
Controller (DC).
2. The user login information is forwarded and distributed to all the firewalls and authentication devices in the
network. Login information usually contains the user name, IP address, and user groups. This way, firewalls
know which user is at which IP address.
3. The firewall uses the source IP address of the packets, and the login information received from the
authentication server, to identify the user and apply the proper firewall policy depending on the user group.
The firewall will not ask the user to authenticate again.
This process is also similar if a user is accessing an internal network resource. The firewall uses the source IP
address to identify the user and determine if they can have access to a specific network service.
DO NOT REPRINT
© FORTINET
This slide shows the multitude of ways FortiAuthenticator can identify users over the FSSO framework.
• The first layer is the identity source: the method by which the user identity is ascertained.
• The second layer is the identity discovery: the methods by which the user identity and their location (IP) are
discovered. You will learn each of these methods in the FSSO User Identity Discovery Methods section.
• The third layer is aggregation and embellishment: the collection of user identity and addition of any missing
information, such as group, which is gathered from the external LDAP/AD.
• The fourth layer is the communication framework: the method by which the authentication information is
communicated with the subscribing device.
• The fifth layer is the subscribing device: for example, FortiGate. The user information is forwarded to the
subscribing device where the information can be used in firewall policies.
Note that you can also combine multiple methods. For example, Single Sign-On Mobility Agent may be used for
Microsoft Windows domain PCs but fall back to the login portal with embedded widgets for non-Windows systems
or unauthenticated PCs.
DO NOT REPRINT
© FORTINET
In the case of Microsoft AD users, there are two ways of collecting login events:
DO NOT REPRINT
© FORTINET
The DC agent mode requires a DC agent to be installed on each of the Windows domain controllers. It also
requires FortiAuthenticator or a Windows domain server with a software collector agent installed to act as a
collector agent. This is how this mode works:
1. When the user logs into the Windows network, a login event is recorded in one of the domain controllers.
2. The DC agent installed in that DC detects the login event and forwards it to the collector agent. In that way,
the collector agent collects the login events from multiple DCs.
3. The FortiAuthenticator or Windows domain server, configured as a collector agent, gathers the login events,
looks up the missing information such as group membership, and then forwards the appropriate collected
login events to FortiGate. The information forwarded contains the user name, user groups, and user IP
address.
When traffic is coming from that user IP address, FortiGate knows in advance which user is there, and applies
the correct firewall policies depending on the user, the user groups, and the traffic destination.
DO NOT REPRINT
© FORTINET
It’s worth mentioning WMI polling, because it relies on DC agent mode. FortiAuthenticator supports WMI polling
to detect workstation logout. This validates the currently logged in user for an IP address that has been
discovered by the DC polling detection method.
Note that remote WMI access requires that the related ports are opened in the Windows firewall, and access to a
domain account that has sufficient permissions, such as domain admins.
DO NOT REPRINT
© FORTINET
Unlike DC agent mode, Windows AD polling mode does not require DC agents and therefore is an alternative for
customers with third-party installation limitations. However, it is not as scalable as the DC mode, and requires
more CPU and memory. Polling can be done directly from FortiGate, so a FortiAuthenticator or other collector
agent is not always needed.
It works as follows:
When traffic is coming from that user IP address, FortiGate knows in advance which user is there, and applies
the right firewall policies and profiles.
DO NOT REPRINT
© FORTINET
So, if you can have single sign-on without FortiAuthenticator, why configure it?
1. Both DC agent mode and polling mode work only in Windows AD environments. You can use
FortiAuthenticator to implement FSSO in both Microsoft and non-Microsoft environments. It can collect login
events from many different sources, which you will learn about later.
2. It offers a Windows AD polling mode that does not require the use of a domain agent and it is more scalable
than polling directly from FortiGate.
DO NOT REPRINT
© FORTINET
FortiAuthenticator therefore takes the FSSO framework introduced in FortiGate and enhances it with several
authentication methods:
• Users can authenticate through a web portal and a set of embeddable widgets
• Users with FortiClient Endpoint Security installed can be automatically authenticated through the FortiClient
SSO Mobility Agent
• SAML authentication can be used to trigger an FSSO authentication
• Users can be identified through the FortiAuthenticator API which is useful for integration with third-party
systems
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Now, you will learn about the different FSSO user identity discovery methods and how to configure them.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in understanding and configuring FSSO discovery methods, you will be able to
implement the different FSSO methods in your network.
DO NOT REPRINT
© FORTINET
FortiAuthenticator has taken the concept of FSSO, as used on FortiGate and the FSSO software client, and
extended it with several new user identification methods. Because of flexibility built in to FortiAuthenticator, this
list is continually growing. This section examines current FSSO user identity discovery methods, including the
following:
• Active Directory polling
• Kerberos-based FSSO
• FortiClient SSO Mobility Agent
• RADIUS accounting
• External syslog
• Rest API
• DC and TS collector agents
• RADIUS accounting proxy
• FortiNAC
You can enable one or more discovery methods on FortiAuthenticator on the General page in the Fortinet
Single Sign-On (FSSO) section.
Some methods require further configuration other than enabling the method shown on this slide. You will explore
the configurations in this section.
DO NOT REPRINT
© FORTINET
FortiAuthenticator is able to poll Windows domain controllers to monitor the security event logs for login events.
Polling of the Security Event Log is configured to occur every 5 seconds so that any login event that has occurred
since the previous poll is captured and entered into FSSO.
Note that while login events can be detected from the security event logs, logout events cannot. This is due to the
fact that logout events can be triggered by many different processes, many that are not indicative of the user
logging out.
While some methods natively support logout detection (like the FortiClient SSO Mobility Agent), others such as
AD polling do not. To enable logout detection, FortiAuthenticator supports Windows Management Instrumentation
(WMI) polling to identify the current logged on user state for a device and log the user out. A manual timeout
period can also be set to remove the user from the authorization table.
DO NOT REPRINT
© FORTINET
In order to use domain controller polling, you must enable Windows Active Directory (AD) domain controller
polling.
After you enable it, you must create a domain controller. This allows FortiAuthenticator to poll the AD event log to
track user logins as well as poll the WMI logs to track the user logouts. You can configure domain controllers on
the Windows Event Log Source page. You must enter the NETBIOS name of the controller, the domain
controller IP address, and the account credentials that can poll the event and WMI logs. Administrator privileges
are not essential, you only need an account that can bind with the domain controller.
DO NOT REPRINT
© FORTINET
To avoid the need to poll the domain controller while still retaining the ability to transparently authenticate
Windows users, FortiAuthenticator supports use of Kerberos tickets passed by the browser and validated against
the key distribution center (KDC) to identify users. In this case, unauthenticated users are redirected from
FortiGate to FortiAuthenticator. FortiAuthenticator requests the service ticket from the browser and then decrypts
and uses the ticket to validate the user identity.
DO NOT REPRINT
© FORTINET
The FortiClient SSO Mobility Agent is part of the standard FortiClient product installation. When installed, the
SSO Mobility Agent identifies Windows Domain users transparently and communicates the user identity and IP
address to FortiAuthenticator for use in FSSO. The agent also monitors the system for IP address changes, such
as those caused by Wi-Fi roaming, and automatically updates FortiAuthenticator. When the user logs out or shuts
down, the user is also logged out of FortiAuthenticator. In cases where an unclean disconnection is made (for
example, power failure, hibernation, network failure), a heartbeat system is implemented so the user will be de-
authenticated following a configurable number of heartbeat failures.
DO NOT REPRINT
© FORTINET
In order to use the SSO Mobility Agent, the service must be enabled. This involves setting the FortiClient listening
port number (by default, it is 8001) and enabling authentication in the communication between FortiAuthenticator
and the FortiClient devices. This requires you to enter the secret key. You can also configure the duration
between keepalive transmissions from 1 to 60 minutes, and the idle time-out period.
The Enable NTLM option helps to prevent attacks based on a user authenticating to an unauthorized AD server
in order to spoof a legitimate user login through the FortiClient SSO Mobility Agent. FortiAuthenticator will initiate
NTLM authentication with the client, proxying the communications only to the legitimate AD servers it is
configured to use. If NTLM is enabled, FortiAuthenticator requires NTLM authentication when:
• The user logs in to a workstation for the first time
• The user logs out and then logs in again
• The workstation IP address changes
• The workstation user changes
• NTLM authentication expires (user configurable)
FortiClient must be configured on the end station by supplying the FortiAuthenticator IP address, communication
port, and secret key.
DO NOT REPRINT
© FORTINET
In situations where device or user identity cannot be established transparently, such as non-domain BYOD
devices or shared kiosk machines, a web portal can be used to prompt users for login. Often this method is used
with other transparent methods and used as a catch-all. Once authenticated, the user remains authenticated until
they log out of the browser.
Because repeated manual reauthentication may impact the user experience, FortiAuthenticator supports
automated user identification for subsequent access through the use of portal widgets. The widget
implementation, which uses an HTML iframe, can be incorporated into a web page, such as an intranet webpage
for users to use for login. Following a successful login, a time-limited cookie, the validity of which is configurable
for up to 30 days, is stored in the user’s browser. On subsequent visits, the user will be transparently
reauthenticated using the user’s cookie key (assuming it matches that stored on FortiAuthenticator). When the
cookie times out, or should the user clear the cache or visit a new machine, the user will be required to
reauthenticate.
DO NOT REPRINT
© FORTINET
In order to use portal services--which support multiple authentication methods, including manual authentication,
embeddable widgets, and Kerberos authentication--you have to configure portal services on the Portal Services
page.
If you want to use manual portal authentication or widgets, enable Enable SSO on login portal. You must
specify if you want to authenticate local users, or remote users, or both (in a remote LDAP server) in the self-
service portal policy. You can also specify if all users can authenticate, or only users that belong to specific
groups.
If you want to use Kerberos authentication so FortiAuthenticator can identify connecting users through a Kerberos
exchange after a redirect from FortiGate, you must first generate a keytab file that describes your Kerberos
infrastructure, and import it. You can use a ktpass utility to generate the file. The code provided in the
FortiAuthenticator Administration Guide can be used in a batch file to simplify the keytab file creation.
The SAML portal enables support for Security Assertion Markup Language (SAML), allowing users to provide one
set of credentials to gain access to many different websites. SAML will be covered, in detail, in another lesson.
The SSO web service refers to SSO using the API. This configuration is needed to allow the API to accept SSO
logins, and to tell the API which type of users will be authenticating.
DO NOT REPRINT
© FORTINET
The RADIUS accounting method uses RADIUS start, interim, and stop accounting packets to trigger login/logout
to FSSO. Such RADIUS packets are commonly sent by networking devices such as SSL-VPN devices, wireless
controllers, and switches.
The benefit of this method is that, for vendors who support sending such packets, no direct support is required by
FortiAuthenticator (they use standard RADIUS which is already supported) and minimal change is required to
enable the input of the user authentication data into the FSSO.
DO NOT REPRINT
© FORTINET
To accept and process the start, interim, and stop packets you must enable the Enable RADIUS accounting
SSO clients option.
Once enabled, you have to configure RADIUS accounting on the RADIUS Accounting Sources page. Here, you
will configure FortiAuthenticator as a RADIUS accounting server to the RADIUS accounting source. The source
could be a RADIUS server, a switch, a Fortigate device, or any other device that can generate RADIUS
accounting packets.
To configure a RADIUS accounting SSO client, you must select a name for the RADIUS accounting client, enter
the IP address of the RADIUS accounting client, and enter the RADIUS client’s preshared key. You must also
select the type of SSO user the client will provide (external, local, remote). If required, you can also customize the
user name, client IP address, and user group RADIUS attributes to match the ones used in the incoming RADIUS
accounting records.
DO NOT REPRINT
© FORTINET
The configuration of FortiAuthenticator to accept and process syslog messages from external sources includes
identifying the sources, defining the syslog rules, and associating the rules with the sources.
Sources identify the entities sending the syslog messages, and the associated rules extract the events from the
syslog messages. Messages coming from non-configured sources are dropped.
The syslog rule configurations provide FortiAuthenticator with the necessary information to parse username and
IP address information from a syslog feed, and inject this information into FSSO so it can be used in FortiGate
firewall policies.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
To enable integration with third-party systems, FortiAuthenticator offers a programmatic REST API that can be
used to authenticate and deauthenticate users into FSSO. This can be used for integration with third-party
applications such as portals and identity management systems.
For more information, see the FortiAuthenticator REST API Solution Guide.
DO NOT REPRINT
© FORTINET
FortiAuthenticator devices support the collection of login information from Windows Active Directory systems
through the installation of the DC agent on the domain controller. Terminal services (TS) agent is a similar
concept, except it collects user login information from Citrix or Windows terminal servers. Citrix users do not have
unique IP addresses. When a Citrix user logs in, the TS agent assigns that user a range of source ports.
DO NOT REPRINT
© FORTINET
In order to use the DC agent and/or TS agent, FortiAuthenticator must be set to listen and accept the incoming
packets from the agents. To do this, enable DC/TS Agent Clients. Remember, FortiAuthenticator can implement
the polling functionality directly, but it can also accept a feed from both DC agent and TS agent installations, if
necessary.
To configure, you must also specify a UDP port (the default is 8002). To enable authentication, select Enable
Authentication and enter the secret key of the DC/TS agent.
DO NOT REPRINT
© FORTINET
RADIUS accounting proxy is different from the previously mentioned RADIUS accounting.
• RADIUS accounting is used to convert, for example, third-party (or FortiGate Wi-Fi/VPN login) RADIUS events
to RSSO. This is most useful in an enterprise environment for adding third-party user identity sources.
• RADIUS accounting proxy, on the other hand, takes in one accounting source and redistributes it to multiple
FortiGate devices. This is most commonly used by ISPs and carriers.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Now, you will review the objectives that you covered in this lesson.
DO NOT REPRINT
© FORTINET
This slide shows the objectives that you covered in this lesson.
By mastering the objectives covered in this lesson, you learned how to use FortiAuthenticator as a login event
collector that uses the FSSO communication framework to transparently authenticate users.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn how to use FortiAuthenticator as a login event collector that uses the Fortinet Single
Sign-On (FSSO) communication framework to transparently authenticate users.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about the topics shown on this slide.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in preparing FortiAuthenticator and FortiGate for FSSO, you will be able to set up
FSSO using FortiAuthenticator on your network.
DO NOT REPRINT
© FORTINET
Each FortiGate that uses FortiAuthenticator to provide SSO authentication must be configured to use
FortiAuthenticator as an SSO server. To do this, you need to create an FSSO agent—which sets
FortiAuthenticator as an SSO server—on FortiGate.
You can configure the FSSO agent on FortiGate on the External Connectors page. You must select FSSO
Agent on Windows AD as the type of SSO agent, enter a name for the agent, enter the IP address of your
FortiAuthenticator, and finally, enter a secret key. The secret key must be the same as the one you will define on
FortiAuthenticator when you enable FSSO authentication later in the process.
DO NOT REPRINT
© FORTINET
When a user tries to access network resources, FortiGate selects the appropriate firewall policy for the
destination. The selection consists of matching the FSSO group the user belongs to with the firewall policy that
matches that group. If the user belongs to one of the permitted user groups associated with that policy, the
connection is allowed. Otherwise, the connection is denied.
You can configure the FSSO user group on FortiGate on the User Groups page. You must enter a name for the
group and select Fortinet Single Sign-On (FSSO) as the group type.
DO NOT REPRINT
© FORTINET
To allow FortiAuthenticator to listen for requests from authentication clients, you must enable FSSO
authentication.
You can enable FSSO authentication on FortiAuthenticator on the General page. You must enable Enable
authentication and then type the secret key in the Secret key field. The secret key that you type here must be
the same secret key that you defined when creating the FSSO agent on FortiGate.
DO NOT REPRINT
© FORTINET
In order to provide FSSO to specific groups on a remote LDAP server, you can filter the polling information so
that it includes only those groups.
You can create a FortiGate filter on the FortiGate Filtering page. You must name the filter, provide the IP
address of FortiGate, enable Forward FSSO information for users from the following subset of
users/groups/containers only, and select the LDAP server and remote group on which you want to filter.
In some situations is may be desirable to exclude designated IP addresses from the FSSO process, for example,
domain controllers or Exchange servers. This is accomplished through the creation of IP filtering rules. Once
crated these rules can be added to the FortiGate filtering configuration.
Note that FortiGate filtering has no effect on which FSSO events are stored on FortiAuthenticator. The filters
affect only which events are passed down to FortiGate.
DO NOT REPRINT
© FORTINET
Finally, in order to allow FortiGate to receive a list of user groups from FortiAuthenticator, you need to add the
SSO group on FortiAuthenticator to the FSSO agent on FortiGate.
If you already created your FSSO agent on FortiGate, you just need to edit it, and then click Apply & Refresh, or
from the CLI, issue the command: execute fsso refresh. FortiGate is able to view the remote group that
you set to filter. The group can now be used in firewall policies.
DO NOT REPRINT
© FORTINET
To use FortiNAC as an SSO session source, you must first configure FortiNAC to participate in SSO session
information transfer. This is accomplished from the Fortinet FSSO Settings page in the System
Communication folder. You must enable Enable FSSO Communications, a port designated for communication
(the default is 8000), and set a password. You must use the same password when configuring devices to gather
SSO session information from FortiNAC.
DO NOT REPRINT
© FORTINET
On the FortiAuthenticator FortiNACs settings page, you will create a FortiNAC entry for each FortiNAC device
the FortiAuthenticator will gather SSO session information from. Each entry will contain a name for the FortiNAC
device, the IP/FQDN of the FortiNAC device, the communication port (this must match the setting on FortiNAC),
and a password (this must match the one configured on FortiNAC).
DO NOT REPRINT
© FORTINET
You must enable the FortiNAC SSO method on FortiAuthenticator. You do this on the General settings page.
After you enable the Enable FortiNAC SSO setting in the Fortinet Single Sign-On (FSSO) section, you can add
FortiNAC sources. The available sources are the FortiNAC devices that have been added to this
FortiAuthenticator. FortiAuthenticator can now begin pulling the SSO session information.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Good job! You now understand how to configure FortiAuthenticator and FortiGate for FSSO.
Now, you will learn about how to optimize the additional settings for FSSO.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in configuring additional settings for FSSO, you will be able to fine-tune the
FortiAuthenticator to work seamlessly with FortiGate for FSSO authentication.
DO NOT REPRINT
© FORTINET
Fine-grained controls provides options to include or exclude a user or group from SSO, and set the maximum
number of concurrent sessions that a user or group can have.
DO NOT REPRINT
© FORTINET
Use SSO users and groups only when you need to modify the behavior of a user or group before sending it to
FortiGate. For example, you would use users and groups when you want to:
Exclude a user from SSO (only supported as a user, not as a group). This is needed in the following scenarios:
• Some antivirus products will log in using service accounts on the PC and overwrite the user credentials,
breaking FSSO.
• To override the default number of concurrent devices a user or group can have in FSSO.
DO NOT REPRINT
© FORTINET
You can configure user group membership on the General page to specify how to cache group information once
FortiAuthenticator has obtained it. There are two ways to cache information: passive mode and active mode.
In passive mode, items have an expiry time after which they are removed and re-queried upon the next login. In
active mode, items are periodically updated for all currently logged in users.
DO NOT REPRINT
© FORTINET
Multiple FortiAuthentictor devices can be configured to work in a hierarchical tiering configuration. The supplier
FortiAuthenticator devices gather information locally, then send the information to the upstream FortiAuthenticator
collector. The collector then aggregates the supplier information and sends the logins up to the FortiGate
device(s).
DO NOT REPRINT
© FORTINET
You enable hierarchical tiering of suppliers and collectors on the General page. You must specify a collector
listening port (the default port is 8003). Suppliers will pass collected information to the configured listening port
while collectors listen to receive information on that port.
DO NOT REPRINT
© FORTINET
You can manage any supplier and collector tier nodes on the Tiered Architecture page.
You must provide a name for the node, a serial number, the role of the tier (supplier or collector), and the IP
address of the node.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Good job! You now understand how to optimize the additional settings for FSSO.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objective shown on this slide.
By demonstrating competence in troubleshooting FSSO issues, you will be able to diagnose and fix FSSO issues
in your network.
DO NOT REPRINT
© FORTINET
When debugging Windows event log source issues, ensure you verify the domain controller configuration on the
Windows Event Log Source page. Check whether the account is specified in the correct User Principal Name
(UPN) format. Ensure the domain controller wasn’t disabled by accident. Lastly, check with your administrator
whether a secure connection is required.
DO NOT REPRINT
© FORTINET
You can find detailed logs in the FSSO debug log. The example shown on this slide indicates that the wrong
password is being used.
DO NOT REPRINT
© FORTINET
The SSO domain monitoring view displays the status of all configured domain controllers. Color coding is used to
convey the result of the last connection attempt for each listed controller.
A green domain controller indicates that the last connection attempt was successful. A gray controller indicates
there is no recent connection information, and a red controller indicates the last connection attempt failed.
Hovering the mouse pointer over a domain controller displays connection details for that controller.
Clicking a domain controller opens a Recent Queries window, which presents the 100 most recent queries
ordered by timestamp. The response times are also color coded as follows:
• Green: Less than 500 ms
• Orange: Between 500 and 1000 ms
• Red: 1000 ms or greater
Any failed queries will contain error information about the failure in the Error column.
DO NOT REPRINT
© FORTINET
The majority of FSSO issues can be traced back to incorrect permissions when querying LDAP or AD. The table
shown on this slide outlines the feature, where it is located on FortiAuthenticator, and the minimum Windows
permissions required.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Now, you will review the objectives that you covered in this lesson.
DO NOT REPRINT
© FORTINET
This slide shows the objectives that you covered in this lesson.
By mastering the objectives covered in this lesson, you learned how to use FortiAuthenticator as a login event
collector that uses the FSSO communication framework to transparently authenticate users.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about portal services offered by FortiAuthenticator.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about the topics shown on this slide.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in portal services, you will be able to understand how they fit in your network
services.
DO NOT REPRINT
© FORTINET
Portal service allows you to grant remote users access to certain portions of your network, using delegated
authentication. In this scenario, authentication requires the user to associate their device with the guest SSID,
as published by the FortiGate wireless controller.
FortiGate facilitates access control by redirecting the user’s web browser to one of FortiAuthenticator’s captive
or guest portals. Because of this, you have to configure FortiGate (on a per-FortiGate basis) to employ captive
or guest portal on FortiAuthenticator.
DO NOT REPRINT
© FORTINET
This slide shows the general process flow for the portal service.
A user connects to the wireless or wired network and tries to access the internet. FortiGate intercepts the
traffic and redirects it to the FortiAuthenticator web login page defined in the FortiGate captive portal profile.
The user enters their credentials on the FortiAuthenticator web login page. FortiAuthenticator performs any
required preauthorization checks and displays the login message to the user. If the user does not have
credentials, there may (depending on configuration) be an option to purchase login time. The login message
instructs the user’s browser to submit the user credentials directly to FortiGate as HTTPS POST, for
authentication processing.
When FortiGate receives the client credentials in the HTTPS POST, it sends a RADIUS Access-Request to
the FortiAuthenticator RADIUS server to authenticate the user. FortiAuthenticator validates the Access-
Request message using its user database, which can either be local or remote (LDAP/RADIUS).
Based on the results of the authentication and authorization processing, FortiAuthenticator responds with
either an Access-Accept or Access-Reject message. RADIUS attributes returned by FortiAuthenticator can be
used to define the access granted to the user by FortiGate. Following a successful authentication and initiation
of the user session, the client is redirected to the originally requested URL, which should now be accessible.
DO NOT REPRINT
© FORTINET
• Credentials authentication: Allows known users (users who already have an account) to authenticate
using their existing credentials (password and/or token code). The goal is to restrict access to a set of
preauthorized users only.
• Social WiFi authentication: Allows FortiAuthenticator to utilize third-party user identity methods (social
sites, valid e-mail address, or phone number) to authenticate users into a wireless guest network. The goal
is to provide some traceability of users, without requiring the heavy overhead of creating guest accounts.
• MAC address authentication: Allows FortiAuthenticator to authenticate the user with minimal interaction
from the user. This is useful in situations where the goal is to provide the most simple experience for the
user as possible (for example, wireless guest networks, retail environments, transient access such as
airports, hotels, and so on).
DO NOT REPRINT
© FORTINET
Guest portal offers pre-login and post-login services that you can use with any authentication type.
Pre-login services offer features like account creation and validation, social login options, form-based
information gathering, disclaimer, password reset feature, and so on.
Post-login services offer features to guest profile information, change passwords, register tokens for the user,
and so on.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating an understanding of authentication types, you will be able to identify their role in your
network.
DO NOT REPRINT
© FORTINET
The credentials portal requires known users (users who already have an account) to authenticate using their
credentials (password and/or token code). The goal is to restrict access to a set of preauthorized users only.
For the credentials portal, the administrator must indicate which of the profiles to use for user authentication.
For environments with one FortiWifi that has multiple access points (APs), the administrator can specify a list
of IP addresses for all the APs.
When the user is redirected to the credentials portal login page, they are prompted to enter their username
and password, and (optionally) their FortiToken passcode. Upon successful login, FortiAuthenticator redirects
the user to the webpage they originally requested.
DO NOT REPRINT
© FORTINET
Regardless of the supported social channel you choose to configure, all social providers follow a similar
process flow:
• The user requires a social account
• FortiAuthenticator delegates the authentication process to the social provider
• After confirming the identity, FortiAuthenticator creates a temporary account in RADIUS and provides it to
FortiGate
• FortiGate uses the credentials to log in
DO NOT REPRINT
© FORTINET
The social WiFi authentication process from the user’s perspective is as follows:
1. The user connects to your Wi-Fi network when trying to access a URL, and the FortiAuthenticator social
WiFi splash page appears.
2. The user selects an authentication method from the social channels offered. If a social channel is not
configured, it appears greyed out (disabled), and the user is unable to select it.
3. FortiAuthenticator prompts the user to enter credentials for the selected social channel.
4. FortiAuthenticator redirects the user to the URL that they originally requested.
DO NOT REPRINT
© FORTINET
The purpose of device-only authentication is to identify and authenticate users with minimal user interaction
and some degree of traceability. This authentication method is less disruptive and, therefore provides a better
user experience.
With MAC address authentication enabled, the user attempts to open a web browser, but is intercepted by the
FortiGate wireless controller, and redirected to the FortiAuthenticator portal configured to record the user's
MAC address (without requiring any user interaction). FortiAuthenticator then redirects the user to the
originally requested webpage.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
DO NOT REPRINT
© FORTINET
This slide shows the steps needed to deploy the captive portal. Portal pages define the pre-login and post-
login services that the portal provides. Access points identify the point of connection used to access the portal.
The portal policy settings define the content of the portal and the authentication process.
DO NOT REPRINT
© FORTINET
Portal creation consists of assigning a name to the portal, and if desired, an SMS gateway for end user
notifications. If you don’t have an SMS gateway, you can use the FortiGuard Messaging Service, if you have
valid licensing for the service.
DO NOT REPRINT
© FORTINET
On the Pre-Login Services page, you can enable or disable the following services, based on your
requirements:
• Disclaimer: If you enable the disclaimer page, the end-user will need to accept the disclaimer before they
can proceed to the login page.
• Password Reset: You can enable this service to setup pre-login password reset.
• Account Registration: With this service enabled guest users, during account login, can register by
entering the required information in the fields specified on the Required filed configuration page. All
guest accounts created using the Account Registration feature will be placed in the group specified in the
Place registered users into a group option. FortiAuthenticator can randomly generate a password for the
guest user, or the user can specify their own password. All accounts registered through the guest portal
must be validated through SMS or email, before they are can be used to log in. FortiAuthenticator will send
the guest user an activation code that they can use to activate their account. Administrators do not have to
manually activate each self-registered account request.
• Token Revocation: Select this service to revoke tokens based on specified conditions.
• Usage Extension Notifications: This service sends users a notification if they exceed their allocated data
or time.
DO NOT REPRINT
© FORTINET
Enabling post-login services allows you to set features that users can use after they are logged in
successfully. You can select the following services on the Post-login Services page:
• Profile: Select this service to allow authenticated users to view their account information, edit their account
information, or both.
• Password Change: Select this service to allow local users, remote users, or both to change their
password once they are successfully logged in.
• Token Registration: Select this service to enable the self-provisioning feature for FortiToken.
• Smart Connect: You can select and assign a smart connect profile.
• Device Tracking and Management: Select this service to allow users to register their device after they
are logged in. When you enable Device Tracking and Management, you must specify which device
group self-registered devices are put in, and specify the Maximum number of devices per user. The
number is set to 3 by default, but can be set to a maximum of 20.
DO NOT REPRINT
© FORTINET
You can configure FortiAuthenticator to provide Windows AD users with the ability to change their Windows
AD passwords remotely. This capability can be provided in the three following ways:
1. Through RADIUS Login, this option requires all of the following configurations:
• FortiAuthenticator has joined the Windows AD domain.
• The RADIUS client is configured to use Windows AD domain authentication
• RADIUS authentication requests use MS-CHAPv2
• The RADIUS client must support MS-CHAPv2 password change
2. Through GUI User Login, this option requires one of the following two criteria:
• FortiAuthenticator is joined to the Windows AD domain
• Secure LDAP (LDAPS) is enabled, and the LDAP admin has sufficient permissions to reset user
passwords
3. Through GUI User Portal, this option requires one of the following two criteria:
• FortiAuthenticator is joined to the Windows AD domain
• LDAPS has been enabled
DO NOT REPRINT
© FORTINET
Now, you will explore another benefit of adding FortiAuthenticator to your LAN edge solution.
If FortiGate is configured to authenticate clients using a remote LDAP server, VPN and wireless clients using
CHAP schemes cannot authenticate. This is the case for wireless clients that use PEAP/MSCHAP2 and IPsec
VPN clients with extended authentication (XAuth) and CHAP. The same applies for any other device or
application using CHAP, MSCHAP, or MSCHAP2 to authenticate against a FortiGate device that uses an
LDAP server as the back end.
During CHAP, MSCHAP, and MSCHAP2 authentication, a client sends a one-way hash of the password.
However, the LDAP server, which is on the back end, expects the password itself. FortiGate, which is acting
as the LDAP client, does not have the client passwords, nor can it convert a hashed password to a cleartext
password.
DO NOT REPRINT
© FORTINET
Two methods that you can use to solve the CHAP and LDAP problem are:
• PAP: Configure FortiGate to use PAP instead of CHAP when authenticating clients. This approach is not
secure due to the nature of the PAP protocol.
• RADIUS: Change the back-end server from LDAP to RADIUS.
If you are using Windows AD as your LDAP server, an alternative is to use FortiAuthenticator as an
authentication proxy. FortiAuthenticator would be located between FortiGate and the Windows server. You
must also configure FortiAuthenticator to log in to the Windows domain using the credentials of a Windows
administrator. This adds FortiAuthenticator as a trusted device on the Windows AD domain, allowing
FortiAuthenticator to proxy the password hash from the client to the Windows server using NTLM.
DO NOT REPRINT
© FORTINET
FortiAuthenticator can store the user database locally. It can also proxy authentication requests from a client
to a back-end authentication server.
Now, you will learn how to configure FortiAuthenticator to proxy authentication requests to a remote LDAP
server, which can be a Windows AD server.
You must configure the following settings: Name, Primary server name/IP, Base distinguished name, Bind
type, and administrator Username and Password for regular bind type. Note that the Base distinguished
name sets the root node where LDAP starts searching for user accounts.
You can select predefined LDAP templates in the Server type section. They include default attribute settings
for well-known LDAP servers, such as Windows AD, OpenLDAP, and Novell eDirectory.
If you want FortiAuthenticator to relay CHAP, MSCHAP, and MSCHAPv2 authentication to a Windows AD
server, you must enable Windows Active Directory Domain Authentication and enter the credentials for a
Windows administrator. FortiAuthenticator logs in to the domain as a trusted device, allowing
FortiAuthenticator to proxy CHAP, MSCHAP, and MSCHAP2 authentication using NTLM.
DO NOT REPRINT
© FORTINET
The Smart Connect post-login service gives you the ability to preconfigure necessary network access security
settings, defined in Smart Connect Profiles, for users that authenticate through the FortiAuthenticator portal.
After successful authentication, the users will have a Smart Connect button displayed on the post-login main
page. The button will initiate the downloading of a script or executable file (depending on the end stations OS)
to perform the configurations.
You create a Smart Connect profile from the Smart Connect Profiles page in the following way:
1. In the Name field, type a name for this profile. In the Connection type field, the only available option is
Wireless.
2. Configure the EAP settings.
3. Configure wireless network details, including typing a value in the SSID field, and selecting WPA2
Personal or WPA2 Enterprise in the Auth method field. Note that if you select WPA2 Personal, you will
need to enter a pre-shared key. If you select WPA2 Enterprise, you will need to configure certificate
installation settings.
4. Configure the certificate installations settings.
DO NOT REPRINT
© FORTINET
You configure access points (APs) to use as part of the portal selection criteria in a portal policy. The APs
define where an end user is being redirected from, in order to be directed to a specific portal.
DO NOT REPRINT
© FORTINET
FortiAuthenticator uses portal policies to determine the appropriate portal and how the user is authenticated.
A multistep policy wizard guides you through the configuration of portal policies. In the initial step, Policy
type, you provide a name and description for the policy, as well as the type of access that FortiAuthenticator
will enforce.
The settings in the Type field allow you to direct users to a designated portal, which you select in the drop-
down list, or you can select Deny captive portal access to deny portal access.
You define the policy match criteria using the configuration options that you set in other policy wizard steps.
DO NOT REPRINT
© FORTINET
You must configure a portal policy to present the portal page to the user. User portal access is mapped based
on the incoming POST parameters.
In the Portal Rule Conditions section, you can configure HTTP parameters that need to be matched before
the user is presented with the portal. Select a parameter in the HTTP parameter drop-down list, and then add
a condition by selecting one of the three pre-defined operators (exact_match, substring_match, or
in_range) in the Operator drop-down list.
For example, to present a portal to users who connect from an IP address in the range of 10.0.1.0/24, set
the following conditions:
DO NOT REPRINT
© FORTINET
In addition to the POST parameters, page presentation depends on the point of connection (the AP) and the
source of the RADIUS message. You select the access points and RADIUS clients on the Authorized clients
page by moving existing entries for each type to the Chosen Access Points and Chosen RADIUS Clients
lists.
DO NOT REPRINT
© FORTINET
You define the type of authentication that FortiAuthenticator will use on the Authentication type page. The
authentication type options are:
• Password/OTP authentication: You can configure validation using local or remote user records, social
media accounts, or both. You can designate local and remote users by realm and filter them by group.
FortiAuthenticator can automatically add users that authenticate using social media accounts to groups
created on the User Groups page. You do not have to manually add users to the group, because
FortiAuthenticator does it dynamically on a successful authentication. You can only add users that log in
through the social or MAC address portals. You can configure account expiration times for social users.
• MAC Authorization: You can grant or deny access based on MAC address parameters or an authorized
group of MAC addresses.
You can configure FortiAuthenticator to automatically assign social users to a user group and define an
account expiration period.
DO NOT REPRINT
© FORTINET
You configure the back-end authentication details on the Identity sources page. If you have enabled social
users as an authentication type, select the social platforms that will be available for user authentication. The
options are Facebook, Google, Twitter, Linkedin, WeChat, Phone number, and Email. For each option,
except for phone number and email, you must configure a remote OAUTH server.
In the Local/Remote Users section, select a username format and realms. You can filter each realm you
select down to the group level.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
The RADIUS response page provides a summary of the RADIUS response for each authentication result.
DO NOT REPRINT
© FORTINET
Just like the customizable replacement messages used for the self-service portal (see the Administering and
Authenticating Users lesson), captive portal messages are also customizable. You can add, modify, or
remove fields. You can enable and disable features. For example, you can include a small eye in the
password field that a user can click on to see their password in plain text.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Good job! You now understand how to configure a FortiAuthenticator captive portal.
Now, you will learn how to configure captive portal settings on FortiGate.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in configuring captive portal services on FortiGate, you will be able to use them
and apply exempt rules in your network.
DO NOT REPRINT
© FORTINET
In order to authenticate portal users and allow them to access the FortiGate network, you must configure
FortiAuthenticator as a RADIUS server on FortiGate (RADIUS Servers page).
For social login, this may sound counterintuitive, because authentication takes place on the social network,
but in order to allow FortiGate to authenticate users, FortiAuthenticator creates a temporary user name and
password in RADIUS and provides the credentials to FortiGate. FortiGate then uses these credentials to
authenticate the user through RADIUS.
To configure FortiAuthenticator as a RADIUS server, you must enter the FortiAuthenticator IP and secret.
DO NOT REPRINT
© FORTINET
A firewall user group for RADIUS users allows FortiGate to check a user’s credentials against the user group.
The authentication user group is required, because it is used to validate the user credentials as part of the
captive portal login process.
You can create a new group for your social users on the User Groups page. Here, you must set the type to
Firewall and create a new remote group, with the FortiAuthenticator RADIUS server configured in the
previous slide as the remote server.
DO NOT REPRINT
© FORTINET
Now, you are ready to enable captive portal as the security mode on FortiGate, and specify the authentication
protocol you are configuring.
On a physical (wired) network interface, you can enable captive portal on the Interfaces page. First, select
Captive Portal as the security mode. Since you are using FortiAuthenticator, your authentication portal will be
external and you must provide the portal address that users will use for access. The portal address for the
guest portal is: URL/portal.
And finally, in the User Groups drop-down list, select your preconfigured firewall group for social users.
For Wi-Fi, a Wi-Fi interface does not exist until you create the Wi-Fi SSID. After you create the Wi-Fi SSID,
you can then enable captive portal by editing the Wi-Fi network interface on the Interfaces page or on the
SSID page.
DO NOT REPRINT
© FORTINET
Now, you need to create firewall policies on FortiGate for captive portal. All traffic going through a FortiGate
must be associated with a policy (so it can be controlled and governed). FortiGate analyzes the connection
packet, registers the incoming, and outgoing interfaces, and attempts to locate a security policy that matches
the packet. If the policy matches the parameters, it looks for an action for that policy (accept or deny). If
FortiGate accepts the packet, it looks to see if there are any other instructions for processing the traffic.
To allow clients access to FortiAuthenticator for registration through the captive portal page, you must exempt
the traffic from the captive portal in the FortiGate policy. This option is only visible if the Policy Advance
Options feature is enabled on the Feature Visibility page.
DO NOT REPRINT
© FORTINET
To allow users to authenticate to the social network sites before they are allowed to browse to the wider
Internet, some exemptions are required.
DO NOT REPRINT
© FORTINET
You also need to create a firewall policy for outbound social network access. This policy allows user access to
specified social networks. You can configure this policy through the CLI or the FortiAuthenticator GUI. You
can create a separate outbound policy for each social network portal, if you prefer.
There is a large list of predefined internet services included in FortiGate. You can create additional services if
one that you need is not included in the predefined list.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Good job! You now understand how to configure FortiGate captive portal settings.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating an understanding of portal management tasks, you will be able to manage portals in your
network.
DO NOT REPRINT
© FORTINET
You can monitor and manage portal users from the FortiGate Firewall User Monitor page.
The social portal removes the overhead of registering guests by using existing third-party identity systems to
authenticate and identify users. Although not registering users directly through FortiAuthenticator, you can still
trace some information about the users logged in to your network through the social portal.
You can monitor social logins from the FortiAuthenticator web-based manager on the Social Login Users
page.
DO NOT REPRINT
© FORTINET
Although you configure account expiry in the FortiAuthenticator social portal settings, for various reasons, you
may wish to forcefully deauthenticate users prior to the expiry time. You can monitor and deauthenticate
users on FortiGate.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
By mastering the objectives covered in this lesson, you learned how to understand, configure, and monitor
portal services in our network.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about private key infrastructure and how to configure FortiAuthenticator as a
certificate authority (CA) that can generate, distribute, and manage digital certificates.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about the topics shown on this slide.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
DO NOT REPRINT
© FORTINET
PKI uses asymmetric cryptography as a way to secure communications between two entities. Cryptography
achieves four objectives:
DO NOT REPRINT
© FORTINET
Asymmetric cryptography is the solution to the problem with symmetric cryptography, which relies on the
same secret key for both encryption and decryption. The problem with symmetric cryptography is that the
sender and recipient have to exchange the secret key so the message can be encrypted and decrypted. The
secret key is exchanged over the internet, and is therefore susceptible to being intercepted.
Asymmetric cryptography uses a key pair. There is a public key, which is openly distributed, and a private
key, which is kept secret by the owner. There is no concern about intercepting the public key, because it is
supposed to be public. The key pairs are mathematically linked, so a message encrypted by the public key
can be decrypted only by using the matching private key. Alternatively, a message encrypted by the private
key, can be decrypted only by using the matching public key.
DO NOT REPRINT
© FORTINET
Digital certificates, also known as X.509 certificates, are used to exchange the public key between two
entities. But they are also much more than that. They contain specific information that identifies both the entity
and the certificate issuer.
The certificate issuer is a CA. A CA signs each certificate it issues in order to certify that the digital certificate
and its contents are trusted and valid.
DO NOT REPRINT
© FORTINET
PKI uses the relationship trust model, and the CA is at the root of the hierarchy as the trusted third-party:
everything begins with the CA. A CA issues its own digital certificate—known as the root certificate—in order
to establish this point of ultimate trust. Once the root certificate is established, the CA can generate digital
certificates that are issued and signed by the root certificate. It can also issue a certificate to a subordinate
CA, which issues certificates on its behalf.
When a CA issues and signs a digital certificate, it is essentially proclaiming, “This is the entity who I say it is
and I certify it”. Accordingly, if users trust the CA and can verify the CA’s signature as authentic, then they
must trust that the public key does belong to the entity identified in the digital certificate.
DO NOT REPRINT
© FORTINET
A CA can generate many different types of certificates, each with different functions (and sometimes,
confusingly, with different names). A few common certificate types include:
• CA certificates (also called root or authority certificates): These certificates identify the CA and create the
root of a CA hierarchy. As such, the certificate details have the same input for both the Issuer and Subject
fields. These certificates are self-signed and contain the CA’s public key needed to decrypt signatures in
the signed certificates.
• Web server certificates (also called local service certificates): These certificates identify web servers and
are used to secure communication to and from web servers, such as an SSH server, HTTPS website, web
portals, or EAP 802.1X authentication servers. The certificate details have the DNS name of the server in
the subject field. The public key of the web server is included.
• User certificates (also called client certificates): These certificates identify one person to another, a
person to a device or gateway, or one device to another device. The certificate includes the public key
associated with the identity.
Both user and web server certificates fall under the category of end-entity certificates.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Good job! You now can describe PKI, digital certificates, and CAs.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
DO NOT REPRINT
© FORTINET
FortiAuthenticator can act as a self-signed or local CA for the creation, signing, and revoking of X.509
certificates, such as server certificates for HTTPS and SSH, and client certificates for HTTPS, SSL, and IPsec
VPN. These certificates can be used for VPN authentication, 802.1X authentication, Windows Desktop
authentication, and token-based authentication, to name a few.
As a CA, the administrator can also import other authorities' CA certificates and CRLs.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
A CSR is a request sent to a CA in order to apply for a digital certificate. The CSR request is usually in the
PKCS#10 format for X.509 certificate requests and includes information the CA requires to issue a certificate.
A CRL is a list that contains revoked certificates (or, more specifically, the serial number of the certificates).
You would revoke a certificate when you no longer want it to be considered trustworthy, for example, if the
private key was compromised or the user who owns the certificate has left the company. A CRL is remotely
accessible, and updated and reposted by the CA periodically, so any entities attempting to validate the
certificate can see that it is revoked based on its presence on the CRL.
A revocation is irreversible. You can reverse only those revocations placed on hold (that is, for a missing
digital certificate).
FortiAuthenticator can sign CSRs as a CA, distribute CRLs, and insert OCSP URLs for client certificate status
queries of intermediate certificates.
DO NOT REPRINT
© FORTINET
OCSP provides a more efficient means for clients to validate certificate status. Instead of downloading and
searching a CRL list of certificate serial numbers OCSP validates as follows:
1. The client requests the servers certificate.
2. The server presents its certificate to the client. The certificate includes the OCSP responder URL to use
for validation.
3. The client validates the status of the certificate with the OCSP responder.
4. The OCSP responder returns the certificate status.
DO NOT REPRINT
© FORTINET
Acting as an LDAP client, FortiAuthenticator can authenticate users against an external LDAP server. It
verifies the identity of the external LDAP server by using a trusted CA certificate.
DO NOT REPRINT
© FORTINET
EAP is a type of authentication framework often used in wireless networks and point-to-point connections. In
this scenario, if a client is attempting to authenticate over EAP, FortiAuthenticator can check that the client’s
certificate is signed by one of the configured (and authorized) CA certificates. The client certificate must also
match one of the user certificates.
DO NOT REPRINT
© FORTINET
FortiAuthenticator can also integrate with FortiManager to deploy digital certificates to multiple FortiGate
devices in VPN implementations. Site-to-site VPNs are often only secured with a preshared key, which, if
compromised, could give access to the whole network. With FortiAuthenticator, certificate-based
authentication is used to secure access to networks over VPN, which is a more secure authentication method.
First, FortiAuthenticator signs and generates the certificates. Second, FortiManager pushes the SCEP client
configuration to all FortiGate devices. Finally, the FortiGate devices automatically get the certificates from
FortiAuthenticator through SCEP.
DO NOT REPRINT
© FORTINET
For client-based certificate VPNs, certificates can be created and stored in the FortiToken 300 USB smart
card token—which is compatible with FortiClient. These client VPN connections are further secured with
FortiAuthenticator.
Since the FortiToken 300 stores an x.509 certificate, it can also be used to authenticate on web-based
applications as well as sign and encrypt email, PDF documents, Microsoft Office files, and software.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
DO NOT REPRINT
© FORTINET
In order for FortiAuthenticator to sign and distribute certificates as the ultimate point of trust in your network,
you need to generate a root certificate—a self-signed CA.
You can create a root certificate on the Local CAs page. You must select Root CA as the certificate type,
and, at a minimum, provide a name (cn), validity period, key size, and hash algorithm.
You also have the option to specify some advanced options for key usages (for example, non repudiation) and
advanced key usages (for example, code signing).
DO NOT REPRINT
© FORTINET
Once the root CA certificate is created, you can use it for generating and signing intermediate certificates. The
procedure is very similar to creating a root CA certificate, but this time you must select Intermediate CA
certificate as the certificate type. You must also select the local root CA that will sign the certificate.
The main reason for using intermediate certificates is for security. If a private key is compromised, all the
certificates signed with that private key are also compromised. In other words, if a CA signs hundreds of
thousands of end-entity certificates using its private key and that private key is compromised, the entire PKI
structure will fail. By using intermediate CAs, the PKI structure becomes segmented into branches. So if the
intermediate CA’s private key is compromised, only one branch in the PKI structure is compromised, and the
rest of the organization remains protected.
DO NOT REPRINT
© FORTINET
FortiAuthenticator also allows you to create an intermediate certificate signed by a third-party root CA. In this
case, FortiAuthenticator must first generate a CSR and send it to the third-party CA. The third-party CA will
send back the signed certificate, which you then must import into FortiAuthenticator.
Again, the procedure for creating a CSR is very similar to creating a root CA certificate, but this time you must
select Intermediate CA certificate signing request (CSR) as the certificate type and not set a validity
period.
Selecting the Intermediate CA option will create and sign the certificate locally on FortiAuthenticator.
DO NOT REPRINT
© FORTINET
FortiAuthenticator can leverage network HSMs for local CA cryptographic key storage. You create the
integration by configuring the HSM server by IP or FQDN, the partition password and client IP. You must also
authorize FortiAuthenticator as a client on the HSM. You then select the server during the creation of a root
CA on the FortiAuthenticator.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Now, you will review the objectives that you covered in this lesson.
DO NOT REPRINT
© FORTINET
This slide shows the objectives that you covered in this lesson.
By mastering the objectives covered in this lesson, you learned how to use FortiAuthenticator as a certificate
authority (CA) that can generate, distribute, and manage digital certificates. You also learned about certificate
revocation lists (CRLs), certificate signing requests (CSRs), and using the Simple Certificate Enrollment
Protocol (SCEP) to import certificates into FortiGate.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn how to use FortiAuthenticator to generate client certificates, manage certificate
revocation lists (CRLs), certificate signing requests (CSRs), and using Simple Certificate Enrollment Protocol
(SCEP) to import certificates into FortiGate.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about the topics shown on this slide.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
DO NOT REPRINT
© FORTINET
You can manually export and import certificates (local or trusted CAs) on the Certificate Authorities page.
You can import the FortiAuthenticator root CA and intermediate CA signed by the root, once exported as a
file, into another network device, such as FortiGate. Once imported by the other network device, that device
can validate (and trust) any certificates signed by the FortiAuthenticator CA. You will examine importing the
root certificate into FortiGate later in this lesson.
Conversely, FortiAuthenticator can import another network device’s certificates. Once imported into
FortiAuthenticator, it can validate (and trust) any certificates signed by that CA.
DO NOT REPRINT
© FORTINET
As mentioned, other network devices, such as FortiGate, can import the FortiAuthenticator root CA. In the
case of FortiGate, you can do this on the Certificates page. You can import manually if you have the CA
certificate downloaded on your local computer, or you can choose to import through the SCEP protocol. The
URL of the FortiAuthenticator SCEP server is http://<FortiAuthenticator_IP>/app/cert/scep.
DO NOT REPRINT
© FORTINET
By using the Learn Certificate button, a certificate chain can be extracted to show the CA certificates, both
root and intermediate. This can greatly simplify the process of importing root and intermediate certificates
from a designated host. You specify a hostname or IP address with a port number and FortiAuthenticator
gathers the certificate chain and will display it for import. The certificates in the chain can be imported
individually or as a group.
DO NOT REPRINT
© FORTINET
You can use the Import button to individually import trusted CA certificates that have been downloaded
locally.
DO NOT REPRINT
© FORTINET
As mentioned earlier, you can create an intermediate CA signing CSR through FortiAuthenticator. Once
created, the status appears as Pending. In order for the status to become active, you must manually export it
and send the file to a third-party CA for signing. Once signed, the third-party CA sends it back to
FortiAuthenticator where you must import it.
DO NOT REPRINT
© FORTINET
FortiAuthenticator can sign certificate signing requests (CSRs). The .csr file is generated on the endpoint
that the certificate will be installed, and then uploaded to FortiAuthenticator to be signed. For example, a .csr
file could be generated on FortiGate in preparation for SSL deep inspection, and then uploaded to
FortiAuthenticator for signing.
DO NOT REPRINT
© FORTINET
Once the certificate has been signed it can be exported for distribution to the endpoint. For example, a
FortiGate device that had previously generated the .csr file.
DO NOT REPRINT
© FORTINET
Intermediate CA certificates can be exported with keys in a PKCS#12 archive file. You can then import the
certificate and key into an endpoints certificate store. Note that the key can only be exported one time.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Good job! You now understand exporting and importing certificates and CSRs.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
DO NOT REPRINT
© FORTINET
You can create a user certificate on the Users page. You must select the CA that will sign this user certificate,
such as a local root CA (which also includes local intermediate CAs) or a third-party CA. Optionally, if you
want to link this certificate to a user locally created on FortiAuthenticator, you can select the user in the drop-
down list. You must select the subject input method, either Fully distinguished name or Field-by-field, and
provide the required information. You must also specify an expiration date or time for the certificate.
You also have the option to configure the certificate further. For example, you can enable the certificate for
smart card logon, and specify some advanced options for key usages (for example, non repudiation) and
advanced key usages (for example, code signing).
DO NOT REPRINT
© FORTINET
Creating a local service certificate is very similar to creating a user certificate. You can create a local service
certificate on the Local Services page. Just as for the user certificate, you must select the CA that will sign
the certificate and the subject input method, as well as specify an expiration date or time for the certificate.
You also have the option to specify some advanced options for key usages for this certificate type as well.
DO NOT REPRINT
© FORTINET
Importing a local service certificate into FortiGate is similar to the process of importing the FortiAuthenticator
root CA certificate into FortiGate. You would import a local service certificate, for example, to provide
FortiGate with HTTPS access to the GUI. Essentially, the certificate becomes available to services and other
processes that run under the local service store.
You can import a local service certificate on the Certificates page on FortiGate. The FortiGate administrator
must have the local service certificate file available to upload.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
DO NOT REPRINT
© FORTINET
You can revoke user certificates on the User Certificates page, or local service certificates on the Local
Services page. Select the certificate and click Revoke. You must select a reason for the revocation from the
reasons listed in the Reason code drop-down list.
Once a certificate is revoked, the operation cannot be undone. The only way you can reinstate a certificate is
if you selected the reason code On Hold. You would place a certificate on hold if, for example, an employee
has misplaced their token with their digital certificate installed on it, but are not ready to concede it is lost, or if
a contractor is temporarily leaving the company, but will return.
DO NOT REPRINT
© FORTINET
The serial numbers of the revoked certificates are automatically placed on the CRL. However, the CRL is
maintained locally, so in order to let other CAs know of a certificate’s revoked status, you must export and
publish (distribute) the CRL.
You can export the CRL on the CRLs page. On FortiAuthenticator, a CRL exists for each local CA. Select the
CRL you want to export and click Export.
You should distribute or publish the CRL periodically, or each time a new certificate has been revoked.
It is important to note that if a CA is deleted, their corresponding CRLs are also deleted (along with any user
certificates they signed).
DO NOT REPRINT
© FORTINET
You can import the CRL into FortiGate on the Certificates page.
In addition to static CRLs, FortiAuthenticator supports the Online Certificate Status Protocol (OCSP) as an
alternative method to checking a certificate’s revocation status, though usually CRLs are used. The OCSP
status check is carried out over HTTP or HTTPS with a request-response format. The authority responding
can reply with a status of good, revoked, or unknown. The OCSP responder can be accessed at
http://FortiAuthenticator_fqdn:2560.
DO NOT REPRINT
© FORTINET
FortiGate can also import a CRL from the FortiAuthenticator SCEP client. This is done on the Certificate
page. Select SCEP and enter the FortiAuthenticator SCEP client URL:
http://<FortiAuthenticator_IP>/app/cert/crl.
When leveraging SCEP the service must be enabled on the client facing port.
DO NOT REPRINT
© FORTINET
FortiAuthenticator supports the CRL distribution points (CDP) and Online Certificate Status Protocol (OCSP)
extensions. The CDP extension provides, within the certificate, the CRL server that can be used to check for
certificate revocation. The OCSP extension defines the URL of the OCSP responder, within the authority
information access field of the issued certificate.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
DO NOT REPRINT
© FORTINET
You can enable SCEP on the General page. You must enter the default CA and enrollment password. You
must also specify the enrollment method type.
Note that when leveraging SCEP the service, you must enable HTTP and/or HTTPs administrator access on
the FortiAuthenticator interfaces that face the SCEP clients. This is also true for CRL distribution.
DO NOT REPRINT
© FORTINET
In order to pre-approve a CSR, you must create an automatic enrollment request on FortiAuthenticator. This
allows you to set a challenge password, which you then pass to the user who wants their certificate signed by
the FortiAuthenticator CA. Once the user has this challenge password and enters it into the CSR for
FortiAuthenticator, they will immediately receive the signed certificate from the FortiAuthenticator SCEP
server.
The automatic enrollment request does not have to be specific to a user, but to anyone who includes the
same subject in their CSR as was configured in the automatic enrollment request, along with the challenge
password. This is known as a wildcard request type and is usually not recommended.
You can create an automatic enrollment request on the Enrolment Request page. You must select the
request type (either regular or wildcard), the CA that will sign the CSR, the subject input method required in
the CSR (fully distinguished name or field-by-field), the validity period, the hash algorithm, and the challenge
password.
DO NOT REPRINT
© FORTINET
You can use a challenge password that is randomly generated by FortiAuthenticator or the preconfigured
default enrollment password of the SCEP client.
You can choose to distribute the random challenge password manually, over SMS, or over email. If you
choose to distribute it manually, the random password is displayed at the top of the page once the automatic
enrollment request is created.
After FortiAuthenticator creates the automatic enrollment request, the status is Pending until the user submits
their CSR with the challenge password.
DO NOT REPRINT
© FORTINET
If FortiAuthenticator has automatically pre-approved a CSR for FortiGate, the FortiGate administrator must
submit a CSR with the challenge password to FortiAuthenticator—after which, FortiAuthenticator
automatically approves the CSR.
On FortiGate, you can create the CSR on the Certificate page. In addition to filling out all the certificate
information, you must select Online SCEP as the enrollment method and enter the SCEP URL and password
provided by FortiAuthenticator.
DO NOT REPRINT
© FORTINET
Device self-enrollment is a method that local and remote users can use to obtain certificates for their devices.
It is primarily used to enable EAP-TLS for bring your own device (BYOD) configurations or VPN
authentication.
Note that EAP-TLS is a bidirectional certificate authentication method; the client and FortiAuthenticator EAP
need to have matching certificates from the same certification authority (CA).
You can enable device self-enrollment on the Device Self-enrollment page. You must:
• Select a preconfigured SCEP enrollment template
• Set a limit on the maximum number of devices that a user can self-enroll
• Select the key size for self-enrolled certificates (1024, 2048, or 4096 bits)
You also have the option to enable self-enrollment for smart card certificates. This requires you to configure
the device FQDN, because it is used in the CRL distribution points certificate extension.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Now, you will review the objectives that you covered in this lesson.
DO NOT REPRINT
© FORTINET
This slide shows the objectives that you covered in this lesson.
By mastering the objectives covered in this lesson, you learned about importing and exporting certificates and
certificate signing requests (CSRs), generating user and local service certificates, certificate revocation lists
(CRLs), and using the Simple Certificate Enrollment Protocol (SCEP) to import certificates into FortiGate.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about wireless and wired 802.1X authentication.
You will learn how to configure FortiAuthenticator, FortiGate, and Windows workstations for a successful
802.1X operation.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about the topics shown on this slide.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in understanding 802.1X authentication, you will be able to use 802.1X
authentication methods in your network.
DO NOT REPRINT
© FORTINET
802.1X is a standard that provides authentication services to network devices that want to join a local wired or
wireless network. The 802.1X standard defines an authentication protocol called EAP. It also defines how
EAP is encapsulated over LAN (the EAPOL protocol) and over RADIUS.
802.1X involves three parties: the client (also commonly known as the supplicant), which is the device that
wants to join the network; the authenticator, which is a network device such as a wireless access point or
switch; and the authentication server, which is a host that supports the RADIUS and EAP protocol, such as
FortiAuthenticator.
The client is not allowed access to the network until the client’s identity has been validated and authorized.
Using 802.1X authentication, the client provides credentials to the authenticator, which the authenticator
forwards to the authentication server for verification. If the authentication server determines that the
credentials are valid, the client device is allowed access to the network.
Note that the authenticator does not need to have a certificate or have any knowledge of the authentication
method (PEAP, TLS, and so on). The authentication is tunnelled from the client to the FortiAuthenticator over
the RADIUS protocol.
DO NOT REPRINT
© FORTINET
When a client (device) connects to a LAN switch that requires 802.1X authentication, the credentials
(machine, user, or MAC address) are sent to the authenticator using EAP over LAN (or EAPOL). The
authenticator then forwards the EAP traffic to an EAP over RADIUS server (FortiAuthenticator).
If the client tries to send user data before authenticating, the traffic is blocked by the authenticator. The client
must authenticate first. The authentication process, is a follows:
DO NOT REPRINT
© FORTINET
This table summarizes the five EAP options that FortiAuthenticator supports.
• PEAP forms a potentially encrypted and authenticated TLS tunnel between the client and server using a
digital certificate on the server. It is known as the outer authentication method because it creates only the
TLS tunnel, to protect authentication transactions. Once the outer tunnel is formed, FortiAuthenticator uses
an EAP-type tunnel as an inner authentication method, such as MSCHAPv2.
• EAP-TTLS (or tunneled transport layer security) extends the TLS protocol. It uses digital certificates on the
server side only. After the server is securely authenticated to the client, it uses the tunnel (the secure
connection) to authenticate the client.
• EAP-GTC is a type of inner authentication method for PEAP, which provides user or device information. It
carries a text challenge from the authentication server and a reply that a security token generates. It allows
generic authentications to virtually any identity store, including OTP token servers, LDAP, Novell
eDirectory, and more. It uses digital certificates on the server side only.
• EAP-MSCHAPv2 is a means for a client and server to mutually authenticate each other, using MSCHAPv2
packets encapsulated in EAP messages, without the need for a client-side certificate.
• EAP-TLS also uses the TLS protocol and is considered one of the most secure EAP standards available
because it supports certificate-based authentication with public keys on both the server and client sides. It
is also the most commonly used method when supporting bring your own device (BYOD) in the enterprise.
DO NOT REPRINT
© FORTINET
The main advantage of using FortiAuthenticator for 802.1X solutions is that it includes all the features that are
required for EAP deployment. FortiAuthenticator is a certificate authority, a SCEP server, and a RADIUS
server all in one device.
You can also use the self-service portal with device certificate self enrollment.
DO NOT REPRINT
© FORTINET
When non-802.1X-compliant devices, such as a printer, want to join the network, FortiAuthenticator offers the
option of 802.1X MAC-based authentication. This feature allows you to add a list of MAC addresses to allow
into the network.
FortiAuthenticator also supports machine-based 802.1X authentication. This feature allows a Windows
machine to authenticate to a network using 802. 1X, prior to user authentication.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in configuring 802.1X: EAP-TLS/TTLS, you will be able to use the wireless
802.1X authentication method in your network.
DO NOT REPRINT
© FORTINET
To configure a wireless solution with 802.1X EAP-TLS authentication, you first require the following:
• A root CA:
You can use either an existing external CA to generate certificates and FortiAuthenticator can act as an
intermediate CA, or you can use FortiAuthenticator as a self-signed root CA. Refer to the Certificate
Management lesson for more information about how to configure a root CA.
• RADIUS server:
The RADIUS server allows FortiAuthenticator to authenticate users using RADIUS. Refer to the
Administrating and Authenticating Users lesson for more information about how to configure a RADIUS
server.
• Wireless clients:
For a wireless 802.1X solution, you require a wireless client. A wireless client should already be set up on
your FortiGate. This configuration is out of scope for this training. Refer to the FortiGate Administration
Guide for more information.
DO NOT REPRINT
© FORTINET
EAP-TLS uses public keys on both the server and the client side, so you need a root CA. The root CA issues
a local server certificate to FortiAuthenticator. To configure EAP-TLS, you need to do the following:
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
5. Configure FortiGate.
This involves:
• Configuring FortiAuthenticator as a RADIUS server on FortiGate. Refer to the Administering and
Authenticating Users lesson for how to configure a RADIUS server.
• Configuring the Wi-Fi controller SSID to use the WPA2 Enterprise security mode. You must also
configure the authentication to use the RADIUS Server.
DO NOT REPRINT
© FORTINET
In the example shown on this slide, the native Windows wireless application is used, which supports various
EAP standards, including EAP-TLS. However, most of the third-party wireless drivers also support EAP, and
their configuration is similar. In most cases, Windows automatically detects the wireless network requirements
and auto-configures the wireless interface properly. In this lesson, you will learn about the manual
configuration for cases where the auto-configuration is unsuccessful.
To manually configure the wireless client, click Wireless Properties associated with your Wi-Fi connection. In
the dialog box that opens, click the Security tab and ensure that WPA2 Enterprise is selected as your
security type. In the Choose a network authentication method drop-down list, select Microsoft Smart
Card or other Certificate (this is the EAP-TLS setting for Microsoft, but other EAP options are available).
If you want to validate the RADIUS server certificate, you can click Settings and enable Verify the server’s
identity by validating the certificate.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in configuring wired 802.1X authentication, you will be able to use it in your
network.
DO NOT REPRINT
© FORTINET
The wired 802.1X authentication process, in general, is very similar to the 802.1X:EAP-TLS authentication
process. The client tries to connect to the network through a LAN switch that supports wired 802.1X (such as
FortiSwitch). The workstation uses EAP over LAN (EAPOL), and the communication between the LAN switch
and the RADIUS server uses EAP over RADIUS.
The EAP configuration on FortiAuthenticator is the same for wired or wireless clients.
DO NOT REPRINT
© FORTINET
To configure a switch to use 802.1X authentication, you must enable 802.1X, enter the FortiAuthenticator IP
address as the RADIUS server IP, and provide the RADIUS secret key.
DO NOT REPRINT
© FORTINET
To enable 802.1X in Windows, open the Windows Component Services application (search for
services.msc). Open the properties for the Wired AutoConfig service and change the startup type to
Automatic. Now, the service will automatically start each time the computer is started. You must reboot your
computer for the changes to take effect.
DO NOT REPRINT
© FORTINET
After you restart your computer, and the Wired AutoConfig service is running, the LAN connection properties
displays a new tab called Authentication. On that tab, select the Enable IEEE 802.1X authentication
checkbox, and select the Microsoft Smart Card or other certificate authentication method (this is EAP-
TLS). Note that other EAP methods are also available.
Optionally, you can click Setting to enable the validation of the RADIUS local server certificate. If enabled,
you must install the root CA certificate of the CA that signed that RADIUS local certificate.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Good job! You now understand how to configure wired 802.1X authentication.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objective shown on this slide.
By demonstrating competence in configuring MAC-based authentication, you will be able to use it in your
network.
DO NOT REPRINT
© FORTINET
The MAC-based authentication feature is a list of MAC addresses that are allowed access to the network. A
non-802.1X-compliant device will be accepted into the network only if its MAC address is on the list.
The RADIUS client, which is usually a LAN switch, must support 802.1X MAC-based authentication. That
means that the RADIUS Service-Type attribute must be set to Call Check, and the Calling-Station-ID must
contain the MAC address.
DO NOT REPRINT
© FORTINET
After you enable MAC-based authentication, you must create a list of allowed MAC addresses on the MAC
Devices page. The clients that do not support 802.1X, and whose MAC address is not in this list, will not be
able to connect to the network.
You can add MAC addresses one at a time, or you can import in bulk from a CSV file. The first column
contains the device names and the second column contains the corresponding MAC address.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in configuring machine-based authentication, you will be able to use it in your
network.
DO NOT REPRINT
© FORTINET
Machine authentication is performed by the computer, which sends its computer object credentials before the
Windows logon screen appears. Machine authentication commonly occurs when the computer starts up or the
user logs out. FortiAuthenticator caches authenticated devices based on their MAC addresses for a
configurable period of time.
You can limit access to the network based on the machine credentials provided during authentication. For
example, you can grant access to only the Active Directory server, to enable user authentication.
After the machine is authenticated, user authentication can take place to authenticate that the user is also
valid. You can then grant further access to the network based on the user credentials.
DO NOT REPRINT
© FORTINET
Windows AD machine authentication uses MSCHAPv2 for encryption. PEAP/MSCHAPv2 are only supported
when the Windows Active Directory Domain Authentication option is enabled on the Remote Auth.
Server settings page. For this reason, you must enable Windows Active Directory Domain Authentication
for access to the Windows AD computer authentication option in RADIUS policies.
DO NOT REPRINT
© FORTINET
You can configure machine authentication for your RADIUS clients on the Identity source and
Authentication factors pages in the RADIUS policy.
Without the override groups configured, the user will be authenticated and added to the group specified in the
RADIUS client configuration.
When the override group membership is set, the group membership is overwritten based on the logic
configured. For example, if the user is the only user authenticated (this is an employee but on an
unapproved personal device), they will be put into a “personal_device” group. Using the override groups, they
can then be added to a predefined VLAN (by using RADIUS attributes assigned to the group).
You must enable Use Windows AD Domain Authentication on the Identity source page in order to have
the Windows AD computer authentication option on the Authentication factors page. Recall that
Windows Active Directory Domain Authentication option must be enabled on the LDAP settings page for
access to these settings.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Now, you will review the objectives that you covered in this lesson.
DO NOT REPRINT
© FORTINET
This slide shows the objectives that you covered in this lesson.
By mastering the objectives covered in this lesson, you learned about 802.1X authentication and how to
configure it.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about the security assertion markup language (SAML), and how to configure and
troubleshoot SAML using FortiAuthenticator.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about the topics shown on this slide.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in understanding SAML, you will be able to describe the process, identify the
different roles, and describe SAML SSO types.
DO NOT REPRINT
© FORTINET
Security Assertion Markup Language (SAML) defines a framework for exchanging security assertions
between SAML entities. It uses an XML-based framework and browser cookies to exchange security
assertions between entities to achieve SSO. One of the main SAML use cases is multiple-domain web SSO.
Online business partners can exchange SAML assertions, to provide user access to multiple web services,
without asking the user to log in to each domain.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
SAML uses security assertions to transfer user identity information between its entities, using the principal (for
example, a web browser). For SAML to work correctly, all SPs participating in SSO must trust the IdP. Once a
user is pointed to an IdP by an SP, the IdP is responsible for authenticating the principal, and asserting
relevant SAML assertions in the browser cookie. The principal will not have to re-authenticate when accessing
partner web services, as long as it is using and trusting the same IdP.
There are three main types of SAML assertions used in the SSO configuration:
• Authentication assertions: contain authentication information about the principal and time.
• Attribute assertions: contain attribute information related to the principal.
• Authorization assertions: contain information about the principal's access privileges.
DO NOT REPRINT
© FORTINET
There are two types of SSO in SAML: IdP initiated and SP initiated.
A user can perform an IdP-initiated login by directly accessing the IdP login page from a browser and
generating a login event. On a web page, the user can then access all the applications that would have
required them to log in. This can simplify the configuration, and administrators do not need to implement
SAML functionality on web servers.
A user can perform an SP-initiated login by visiting a SAML SP-compliant page that would then redirect the
user to IdP for authentication. It will transparently redirect the users before providing access to secure content.
The SP will need authorization assertions from the IdP before allowing users to access resources.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in understanding the SAML flow and the advantages of SAML, you will be able
to make deployment decisions for your environment.
DO NOT REPRINT
© FORTINET
Now, you will learn about the SAML packet flow for a non-authenticated principal that is trying to access
resources.
The principal can continue to access resources on SP1, without having to log in again, until the SAML
authentication cookie expires, or the user closes the web session, or the user triggers a log out.
DO NOT REPRINT
© FORTINET
Now, you will learn about the SAML packet flow for an authenticated principal that is trying to access
resources on another SP in the federation.
The principal can now access resources on SP2 until the SAML assertion expires, or the user closes the web
session, or the user triggers a logout.
DO NOT REPRINT
© FORTINET
When using SAML for web SSO, SPs never need to directly communicate with the IdP for SSO to work. All
communication between the IdP and SPs happens through the principal that is trying to request the resources.
Another advantage of using SAML is that as long as the principal and IdP are located behind the same
firewall, user credentials will never leave the network. Third-party SPs will redirect unauthenticated users back
to the IdP for authentication, and users will enter credentials only after they is prompted by the IdP. Multiple
domains can use the same IdP for SSO when using SAML. SAML SSO relies on SAML assertions that are
created by the IdP, for a principal. SPs will use these assertions to grant access to the principal.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Good job! You now understand SAML SSO flow and advantages.
Now, you will learn how to configure FortiAuthenticator as a SAML identity provider.
DO NOT REPRINT
© FORTINET
After completing this section, you will be able to achieve the objective shown on this slide.
DO NOT REPRINT
© FORTINET
You can configure FortiAuthenticator as a SAML IdP or an SP. When you configure FortiAuthenticator as an
IdP, it uses the self-serve login web portal to prompt the user for authentication. FortiAuthenticator can use
the local user database or remote authentication server to validate authentication requests. You must add all
SPs to FortiAuthenticator to establish a trust relationship between the SPs and FortiAuthenticator. Once an
SP is added to FortiAuthenticator, it can create SAML authorization assertions for the SP.
You can also configure FortiAuthenticator as an SP, to request assertions from a third-party IdP such as Okta.
When you configure FortiAuthenticator in the SAML SP role, it can use SAML attributes assertion to generate
an FSSO session and distribute the information to FortiGate devices within a network. This works in a similar
way to RADIUS SSO, where you use the attributes provided by the server to generate FSSO sessions for an
internal network.
Note that FortiAuthenticator can convert a SAML web SSO to an FSSO session.
DO NOT REPRINT
© FORTINET
The following is the an overview of the configuration you must complete to enable FortiAuthenticator to
perform the IdP role in SAML.
• Create a realm for the remote authentication server.
• This is required only if you are using remote authentication server.
• Create or import local server certification to use in SAML configuration.
• Certificates will be used to sign SAML assertions.
• Enable and configure IdP settings.
• Select the authentication realm to use for user authentication.
• You can narrow down the scope to a specific group using group filter option.
• Add SP configuration.
• You must add all SPs separately.
DO NOT REPRINT
© FORTINET
You must enable FortiAuthenticator to support SAML in the IdP role. The server address is used when
metadata information is generated. If you have multiple IPs on FortiAuthenticator, FortiAuthenticator will
define which interface will be used to listen for authentication requests. On the FortiAuthenticator IdP
configuration page, you can also modify the SAML SSO assertion timeout value. You can also select a default
realm that will be used for user authentication. You can specify to override remote users, if an account also
exists in the FortiAuthenticator user database. Furthermore, you can narrow down the scope of user lookup to
a specific group using the group filter option. You need to select an IdP certificate, which is a local service
certificate that you can generate or import in the certificate manager section of FortiAuthenticator. Enabling
the Get nested groups for user option allows the IdP to perform a nested group lookup for Windows AD.
Identity and access management (IAM) user accounts, created in the IAM view under Authentication > User
Management, can be used for SAML IdP logins.
DO NOT REPRINT
© FORTINET
The next step is to define SPs on FortiAuthenticator. You must give a unique name and IdP prefix to each SP
that you add to the FortiAuthenticator configuration. You can choose to generate a 16-digit prefix to use in the
IdP entity ID, IdP sign-on, and logout URL. This prefix uniquely identifies the IdP to the SP. You must copy
this configuration to the SP configuration. SAML allows you to use XML metadata files to export these
parameters accurately.
You can click Import SP metadata to load a metadata file to assist in the configuration of a SAML service
provider. The metadata files are xml files that contain details about the service provider, such as, entity
descriptors, URLs, certificates, and so on. The SP metadata file provides the IdP with all the information it
needs to trust and accept redirection from an SP.
You can download all of the IdP-related configurations from this page by clicking Download IdP metadata at
the bottom of the view. The metadata file provides the information required for the SP to use and trust
FortiAuthenticator as an IdP.
DO NOT REPRINT
© FORTINET
You can enable support for IdP-initiated assertion response in situations where it is necessary for the IdP
server to generate and send a SAML assertion to the SP, without a prior request from the SP. In this
configuration, the user accesses the IdP login portal and, if the user’s browser is already authenticated, the
user will be presented with a portal landing page that includes a list of SPs that participate in IdP-initiated
login. The end user can then select the SP to access, and the IdP will generate the SAML assertion and send
it to the SP.
The Relay state setting allows the SP to redirect the user after a successful assertion response.
When you enable the Participate in single logout option, logging out of the SP will automatically log you out
of all single-logout-configured SPs.
DO NOT REPRINT
© FORTINET
Within the SP configuration, you can enforce further options. You can also enforce two-factor, or FIDO
authentication on users that log in through SAML. Depending on the options you select, users will be
prompted to enter a token with their credentials when they are prompted for authentication.
Assertion Attributes are used to pass information to an SP from the IdP. You can configure the assertion the
IdP will provide, after a user is successfully authenticated. For example, you can configure the Subject Name
ID attribute (usually used to send the username back to the SP) to send the email, User DN, or objectGUID
instead.
DO NOT REPRINT
© FORTINET
SAML attributes assertions are used to return more than just authentication and authorization information
about a principal. SAML assertions can provide details about a principal that can then be used by SP to
extend the functionally of the service they offer. For example, an SP can use SAML attributes assertions to
exchange information such as principal membership level among multiple online partners that use the same
IdP for web SSO. You can create and assign more then one SAML attribute to a principal and send the
assertions only to SPs that you want to.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Good job! You now understand how to configure FortiAuthenticator as a SAML IdP.
Now, you will learn how to configure FortiAuthenticator as a SAML service provider.
DO NOT REPRINT
© FORTINET
After completing this section, you will bea ble to achieve the objective shown on this slide.
DO NOT REPRINT
© FORTINET
When configuring FortiAuthenticator as a SAML SP, you do not need to host the user database locally. User
authentication will be performed by a third-party IdP, and FortiAuthenticator will direct principals to the IdP
portal for authentication. After the authentication is successful, FortiAuthenticator can then use SAML
assertions to generate FSSO sessions for the SAML principals. Then, FortiAuthenticator will share this
information with the FortiGate devices within the network to allow the principals to access the internet or
resources hosted locally.
DO NOT REPRINT
© FORTINET
When using the FortiAuthenticator as a SAML SP, the communication sequence will look like this:
1. The client tries to connect to a web server on the internet.
2. FortiGate redirects the client to the captive portal (http://<FortiAuthenticator
IP>/login/saml-auth).
3. If the user doesn't already have a valid (non-expired) SAML login ticket, FortiAuthenticator redirects the
client to the SAML IdP.
4. The client authenticates on the SAML IdP portal and gets a SAML login ticket.
5. SAML IdP redirects the client to FortiAuthenticator.
6. The client gives the SAML login ticket to FortiAuthenticator.
7. The FortiAuthenticator adds the client to the list of logged-in SSO users, and the new list of logged-in SSO
users is sent from FortiAuthenticator, to FortiGate. At this point the FortiAuthenticator converts the SSO
users to FSSO, this allows you to leverage FSSO groups and firewall policies.
8. FortiAuthenticator redirects the client to the web server.
Note that you must configure captive portal exemptions for the client to FortiAuthenticator and the client to
SAML IdP.
DO NOT REPRINT
© FORTINET
You must enable SAML portal services to configure FortiAuthenticator to act as an SP. Enable the SAML
portal by clicking Fortinet SSO Methods > SSO > Portal Services and enabling the Enable SAML portal
option.
DO NOT REPRINT
© FORTINET
Create a remote SAML authentication server from Authentication > Remote Auth. Servers > SAML.
FortiAuthenticator will generate the SAML URLs and entity ID automatically. The Portal URL is where
unauthenticated users are directed for authentication. Requests on the portal authentication URL will be
redirected to IdP to perform user authentication. Importing the metadata file will configure the IdP settings.
Once the authentication is successful, the IdP will attach an assertion that FortiAuthenticator can then use to
generate an FSSO session for the principal. You can also configure FortiAuthenticator to perform LDAP
lookup for group membership of the principal, as long as the IdP and FortiAuthenticator use the same LDAP
server. You can also specify whether the username of the principal is pulled in from Boolean assertions or
test-based attributes.
DO NOT REPRINT
© FORTINET
Furthermore, you can implicitly assign all SAML users to a specific SSO group that you can configure locally
on FortiAuthenticator.
DO NOT REPRINT
© FORTINET
You can then configure FortiAuthenticator to use the remote SAML server as an IdP, by selecting it in the
Remote SAML server drop-down list.
DO NOT REPRINT
© FORTINET
SAML assertions for a FortiAuthenticator SP will be used to generate FSSO sessions. You can view logs to
get more information about FSSO sessions, usernames, SAML authentications, and so on. You can view
successful SAML FSSO sessions on FortiAuthenticator on the SSO sessions tab. Note that SAML users are
categorized as external users and added to an SSO group called SAML FSSO that you created locally on
FortiAuthenticator. The FSSO sessions of all SAML users will be forwarded to the FortiGate devices with the
information you provided on the SSO Sessions page on FortiAuthenticator.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Good job! You now understand how to configure FortiAuthenticator as a SAML service provider.
Now, you will learn how to troubleshoot SAML configurations with FortiAuthenticator.
DO NOT REPRINT
© FORTINET
After completing this section, you will be able to achieve the objective shown on this slide.
By demonstrating competence in SAML troubleshooting tools, you will be able to resolve SAML deployment
issues.
DO NOT REPRINT
© FORTINET
When FortiAuthenticator is configured in the IdP role, you must identify whether the issue is caused by an
authentication error, or related to SAML assertions. In the IdP role, FortiAuthenticator needs to perform
authentication for the user, so you need to ensure that the portal is configured properly. Review the
FortiAuthenticator logs to identify what is causing the issue.
To troubleshoot SAML-related issues, you can use tools such as the SAML tracer add-on that will track all the
redirects and display SAML assertions. You can keep track of which SP initiated the SAML SSO, which IdP
the principal is redirected to, and what assertions were inserted in the browser. Verify the entire configuration
on both the IdP and the SP to ensure you used the correct URLs and entity IDs.
To troubleshoot debug errors on FortiAuthenticator, you can use the GUI logs to identify what is causing the
issues.
DO NOT REPRINT
© FORTINET
If FortiAuthenticator is configured in a SAML SP role, FortiGate devices in the network must have
FortiAuthenticator configured as an external captive portal to forward unauthenticated user requests.
FortiGate must have an exempt policy in place to forward authentication requests that FortiAuthenticator will
be forwarding to the third-party IdP. If users are having issues accessing the login page, make sure that the
exempt policy is allowing all traffic to the IdP URL(s). Check the configuration on FortiAuthenticator to make
sure the IdP URLs and entity IDs are correct.
If the authentication is successful and you are receiving SAML assertions, verify that FSSO sessions are
created on FortiAuthenticator. Use a SAML tracer to view SAML exchanges and assertions, and refer to the
FortiAuthenticator logs to view errors. If you see FSSO sessions but users are still not able to access
resources, check the FSSO information on FortiGate to verify that users are populating properly.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
SAML session information can be found in the logs view. User information is displayed along with the
authentication time, the authentication expiration (shown as Valid Until), and the IdP session ID
DO NOT REPRINT
© FORTINET
You can view SAML assertions and exchanges using the SAML tracer add-on in a Firefox web browser. This
add-on allows you to keep track of all redirections, and SAML assertions and attributes that are exchanged
during the authentication.
The example on this slide shows a SAML authentication request that is sent to an IdP. It includes SAML
protocol and assertion information, the IdP login portal address that the authentication request will be
forwarded to, and information about the SAML SP that is requesting the authentication. The request also
contains the assertion consumer service URL, which is where the response from the IdP will be returned.
DO NOT REPRINT
© FORTINET
This slide shows an example of an authentication response sent from the IdP. The SAML authentication
response includes basic SAML protocol information. The authentication response also includes authentication
information such as the SAML NameID attribute value, time of authentication, authentication conditions
(validity period), and the response recipient (which is usually the SP).
DO NOT REPRINT
© FORTINET
The authentication response assertion returned also includes authentication attributes by the IdP. The
attribute assertion contains additional information about a principal that can be used by an SP to provide
additional features and services to the authenticated user. The example shown on this slide includes two
attributes, username and user DN that are asserted by the IdP for this SP. SAML attributes can add extra
value because exchanging this information is completely transparent to the user.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Now, you will review the objectives that you covered in this lesson.
DO NOT REPRINT
© FORTINET
This slide shows the objectives that you covered in this lesson.
By mastering the objectives covered in this lesson, you now understand SAML, and how to configure and
troubleshoot SAML using FortiAuthenticator.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about fast ID online 2 (FIDO2) authentication. Specifically, an overview of how it
works, its advantages, and how to leverage it with FortiAuthenticator.
DO NOT REPRINT
© FORTINET
In this lesson, you will learn about the topics shown on this slide.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in understanding fast ID online 2 (FIDO2), you will be able to describe the
processes and security advantages of FIDO2.
DO NOT REPRINT
© FORTINET
The FIDO2 set of specifications includes the World Wide Consortium’s (W3C) Web Authentication
(WebAuthn) and the FIDO Alliance’s Client to Authenticator protocol (CTAP).
FIDO2 leverages standard public key cryptography to provide a simpler and more secure authentication
option. A FIDO2-compliant device creates a public and private key pair for each online service using FIDO2
authentication and associates those with a user account. The public key is passed to the online service for
association with the user account on the service end. The private key is locally stored and never leaves the
device, so it cannot be compromised by phishing attacks or server-side data breaches, making it more secure
than a password-based solution. For the end user, authentication becomes far more convenient, requiring the
device to be unlocked with a simple PIN or non-memory-based option, like biometric (fingerprint, voice
recognition), or physical interaction (touch sensor or push button), replacing the need to remember
passwords. Security is further enhanced by the need for the FIDO2 device to be physically present with the
end user during authentication.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
The packet flow for FIDO2 authentication occurs between the three FIDO2 components, and proceeds as
follows:
1. The user (with the authenticator) attempts to access the service using the client.
2. The client issues an authentication request to the server or IdP.
3. The server or IdP issues a challenge.
4. The client prompts the user to unlock their FIDO2 authenticator.
5. The authenticator uses the private key to sign the challenge and send it to the server or IdP.
6. The server or IdP validates the private key that signed the challenge matches the public key associated
with the user account, and if so, validates authentication.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Good job! You now have a brief understanding of FIDO registration and login processes.
DO NOT REPRINT
© FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide.
DO NOT REPRINT
© FORTINET
You can enable FIDO2 authentication for local and remote user accounts in the user records stored on
FortiAuthenticator.
DO NOT REPRINT
© FORTINET
To take advantage of FIDO2 authentication on FortiAuthenticator portals, both captive and self-service, you
must enable the FIDO authentication option on the corresponding portal policy. You can require both a
password validation as well as a FIDO2 token, or just the FIDO2 token. The FIDO authentication is applied
only to users who have a registered token.
DO NOT REPRINT
© FORTINET
When you enable the options on the self-service portal, users can register and manage their FIDO keys. To
add a key to their account, the user clicks the Add FIDO key button and enters a name for the key. The user
then must insert and unlock the key.
DO NOT REPRINT
© FORTINET
An administrative user can manage FIDO2 keys on the user properties page on FortiAuthenticator. A user can
revoke their own keys by selecting the Lost my FIDO token option on the login screen.
DO NOT REPRINT
© FORTINET
This slide shows an example packet flow with FortiAuthenticator acting as an IdP with FIDO2 authentication.
The steps to complete the authentication are as follows:
1. The user attempts to connect to the online service using the client.
2. The online service redirects the user agent to the FIDO2 enabled FortiAuthenticator using SAML.
3. The client issues a SAML request to FortiAuthenticator.
4. FortiAuthenticator issues a FIDO2 challenge.
5. The user unlocks the FIDO2 authenticator for the client.
6. The client responds to the FortiAuthenticator challenge.
7. FortiAuthenticator validates the response.
8. FortiAuthenticator issues the SAML assertion to the client.
DO NOT REPRINT
© FORTINET
You define when FIDO2 authentication is necessary in the Authentication section of a service provider
configuration. In the Authentication method option list, selecting FIDO-only requires that authentication is
based on the username and the FIDO2 key response. Selecting Password and FIDO requires both a valid
password for the user account, as well as a successful response from a FIDO2 key. FIDO2 authentication is
optional for any of the other selections, if it has been configured on the service provider.
DO NOT REPRINT
© FORTINET
The example shown on this slide shows a user logging in to a FortiGate device that has been configured as a
service provider on FortiAuthenticator. The service provider has the Authentication method set to FIDO-
only. The process proceeds as follows:
1. The user accesses the FortiGate login page and selects Sign in with Security Fabric. The user is
redirected to the authentication page on FortiAuthenticator.
2. The user enters their username, and then clicks Next.
3. The client instructs the user that they must enter the PIN for their security key.
4. The FortiAuthenticator challenges the client. The client signs the challenge with the private key.
FortiAuthenticator authenticates the user.
5. The client is redirected and logged in to the service (FortiGate).
DO NOT REPRINT
© FORTINET
FortiAuthenticator logs the authentication process. In the example shown on this slide, the administrator login
in-session events can be seen as the lower four events in the log, and the logout events are the top three. You
can click any event in the event log to display log details.
DO NOT REPRINT
© FORTINET
DO NOT REPRINT
© FORTINET
Now, you will review the objectives that you covered in this lesson.
DO NOT REPRINT
© FORTINET
This slide shows the objectives that you covered in this lesson.
By mastering the objectives covered in this lesson, you now understand FIDO, and how to configure FIDO
using FortiAuthenticator.
No part of this publication may be reproduced in any form or by any means or used to make any
derivative such as translation, transformation, or adaptation without permission from Fortinet Inc.,
as stipulated by the United States Copyright Act of 1976.
Copyright© 2022 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet,
Inc., in the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company
names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and
actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein
represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written
contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified
performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For
absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. In no event does Fortinet make any
commitment related to future deliverables, features, or development, and circumstances may change such that any forward-looking statements herein are not accurate.
Fortinet disclaims in full any covenants, representations,and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify,
transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.