FortiAuthenticator 6.6.2 Release Notes
FortiAuthenticator 6.6.2 Release Notes
FortiAuthenticator 6.6.2
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTIGUARD LABS
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
August 6, 2024
FortiAuthenticator 6.6.2 Release Notes
23-662-1055024-20240806
TABLE OF CONTENTS
Change log 4
FortiAuthenticator 6.6.2 release 5
Special notices 6
TFTP boot firmware upgrade process 6
Monitor settings for GUI access 6
Before any firmware upgrade 6
After any firmware upgrade 6
FortiAuthenticator does not support PEAP-MAB 6
SHA-1 cryptographic operations are no longer supported 6
Reconfigure LinkedIn social login 7
What's new 8
Upgrade instructions 9
Hardware and VM support 9
Image checksums 9
Upgrading from 4.x/5.x/6.x 10
Product integration and support 13
Web browser support 13
FortiOS support 13
Fortinet agent support 13
Virtualization software support 14
Third-party RADIUS authentication 14
FortiAuthenticator-VM 15
Resolved issues 16
Common Vulnerabilities and Exposures 17
Known issues 18
Maximum values for hardware appliances 19
Maximum values for VM 23
This document provides a summary of new features, enhancements, support information, installation instructions,
caveats, and resolved and known issues for FortiAuthenticator 6.6.2, build 1669.
FortiAuthenticator is a user and identity management solution that provides strong authentication, wireless 802.1X
authentication, certificate management, RADIUS AAA (authentication, authorization, and accounting), and Fortinet
Single Sign-On (FSSO).
For additional documentation, please visit: https://docs.fortinet.com/product/fortiauthenticator/
Special notices
Upgrading FortiAuthenticator firmware by interrupting the FortiAuthenticator boot process and installing a firmware
image from a TFTP server erases the current FortiAuthenticator configuration and replaces it with factory default
settings.
Fortinet recommends setting your monitor to a screen resolution of 1600x1200. This allows for all the objects in the GUI
to be viewed properly without the need for scrolling.
Save a copy of your FortiAuthenticator configuration before upgrading the firmware. From the administrator dropdown
menu in the toolbar, go to Restore/Backup, and click Download Backup File to backup the configuration.
Clear your browser cache before logging in to the FortiAuthenticator GUI to ensure the pages display properly.
FortiAuthenticator only supports MAB in clear-text and not the encapsulated MAB.
FortiAuthenticator does not support SHA-1 as the SHA-1 cryptographic algorithm is no longer considered secure.
Update SHA-1 certificate signing to use SHA-2 or above for enhanced security. If this is not possible, downgrade to
FortiAuthenticator version 6.5.3 for SHA-1 support.
What's new
FortiAuthenticator version 6.6.2 is a patch release. There are no new features. See Resolved issues on page 16 and
Known issues on page 18 for more information.
Back up your configuration before beginning this procedure. While no data loss should occur if
the procedures below are correctly followed, it is recommended a full backup is made before
proceeding and the user will be prompted to do so as part of the upgrade process.
For information on how to back up the FortiAuthenticator configuration, see the
FortiAuthenticator Administration Guide.
Image checksums
To verify the integrity of the firmware file, use a checksum tool to compute the firmware file’s MD5 checksum. Compare it
with the checksum indicated by Fortinet. If the checksums match, the file is intact.
MD5 checksums for software releases are available on FortiCloud.
After logging in to FortiCloud, in the menus at the top of the page, click Support, then click Firmware Image
Checksum.
In the Image File Name field, enter the firmware image file name including its extension, then click Get Checksum
Code to get the checksum code.
FortiAuthenticator 6.6.2 build 1669 officially supports upgrades from previous versions by following these supported
FortiAuthenticator upgrade paths:
l If currently running FortiAuthenticator 6.0.5 or older, first upgrade to 6.0.7, then upgrade to 6.6.2, else the following
message will be displayed: Image validation failed: The firmware image model number is
different from the appliance's.
l If currently running FortiAuthenticator 6.0.7, then upgrade to 6.6.2 directly.
l If currently running FortiAuthenticator between 6.1.0 and 6.2.0, first upgrade to 6.3.3, then upgrade to 6.6.2.
l If currently running FortiAuthenticator 6.2.1 or later, then upgrade to 6.6.2 directly.
When upgrading existing KVM and Xen virtual machines to FortiAuthenticator 6.6.2 from
FortiAuthenticator 6.0.7, you must first increase the size of the virtual hard disk drive
containing the operating system image (not applicable for AWS & OCI Cloud Marketplace
upgrades). See Upgrading KVM / Xen virtual machines on page 11.
First, back up your configuration, then follow the procedure below to upgrade the firmware.
Before you can install FortiAuthenticator firmware, you must download the firmware image from the FortiCloud, then
upload it from your computer to the FortiAuthenticator unit.
1. Log in to the FortiCloud. In the Support > Download section of the page, select the Firmware Download link to
download the firmware.
2. To verify the integrity of the download, go back to the Download section of the login page and click the Firmware
Image Checksum link.
3. Log in to the FortiAuthenticator unit’s web-based manager using the admin administrator account.
4. Upload the firmware and begin the upgrade.
When upgrading from FortiAuthenticator 6.0.4 and earlier:
a. Go to System > Dashboard > Status.
b. In the System Information widget, in the Firmware Version row, select Upgrade. The Firmware Upgrade or
Downgrade dialog box opens.
c. In the Firmware section, select Choose File, and locate the upgrade package that you downloaded.
When upgrading from FortiAuthenticator 6.1.0 or later.
a. Click on the administrator name in the upper-right corner of the GUI to display the dropdown menu, and click
Upgrade.
b. In the Firmware Upgrade or Downgrade section, select Upload a file, and locate the upgrade package that
you downloaded.
5. Select OK to upload the file to the FortiAuthenticator.
Your browser uploads the firmware file. The time required varies by the size of the file and the speed of your network
connection. When the file transfer is complete, the following message is shown:
Fortinet recommends to save a copy of the current configuration before proceeding
with firmware upgrade.
It is recommended that a system backup is taken at this point. Once complete, click Start Upgrade.
Wait until the unpacking, upgrade, and reboot process completes (usually 3-5 minutes), then refresh the page.
Due to a known issue in 6.0.x and earlier releases, the port5 and port6 fiber ports are inverted
in the GUI for FAC-3000E models (i.e. port5 in the GUI corresponds to the physical port6 and
vice-versa).
This is resolved in 6.1.0 and later, however, the upgrade process does not swap these
configurations automatically. If these ports are used in your configuration during the upgrade
from 6.0.x to 6.1.0 and later, you will need to physically swap the port5 and port6 fibers to
avoid inverting your connections following the upgrade.
When upgrading existing KVM and Xen virtual machines from FortiAuthenticator 6.0.7 to 6.6.2, it is necessary to
manually increase the size of the virtual hard disk drive which contains the operating system image before starting the
upgrade. This requires file system write-access to the virtual machine disk drives, and must be performed while the
virtual machines are in an offline state, fully powered down.
If your virtual machine has snapshots, the resize commands detailed below will exit with an
error. You must delete the snapshots in order to perform this resize operation. Please make a
separate copy of the virtual disk drives before deleting snapshots to ensure you have the
ability to rollback.
After this command has been completed, you may proceed with the upgrade from 6.0.7 to 6.6.2
If the upgrade was performed without completing the resize operation above, the virtual machine will fail to properly boot,
instead displaying many initd error messages. If no snapshots are available, manual recovery is necessary.
To recover your virtual machine, you will need to replace the operating system disk with a good copy, which also requires
write-access to the virtual hard disks in the file system while the virtual machines are in an offline state, fully powered
down.
FortiOS support
Note that the FortiAuthenticator Agents for Microsoft Windows and OWA download files are now available in the
FortiTrustID_Agents folder in Support > Firmware Download on FortiCloud.
l FSSO DC Agent v.5.x
l FSSO TS Agent v.5.x
Other Agent versions may function correctly, but are not supported by Fortinet.
For details of which operating systems are supported by each agent, please see the install guides provided with the
software.
Note: FortiAuthenticator Agent for Microsoft Windows 4.0 and above required to support emergency offline access.
Also, FortiAuthenticator Agent for Microsoft Windows below 4.0 compatible for all other features.
Support for HA in Active-Passive and Active-Active modes has not been confirmed on the
FortiAuthenticator for Xen VM at the time of the release.
FortiAuthenticator uses standards based RADIUS for authentication and can deliver two-factor authentication via
multiple methods for the greatest compatibility:
l RADIUS Challenge Response - Requires support by third party vendor.
l Token Passcode Appended - Supports any RADIUS compatible system.
FortiAuthenticator should therefore be compatible with any RADIUS capable authentication client / network access
server (NAS).
FortiAuthenticator-VM
For information about FortiAuthenticator-VM deployments and system requirements, see the VM installation guide on
the Fortinet Docs Library.
Resolved issues
The resolved issues listed below may not list every bug that has been corrected with this release. For inquiries about a
particular bug, please contact Technical Support within the FortiCare portal.
Bug ID Description
Known issues
This section lists the known issues of this release, but is not a complete list. For inquiries about a particular bug, please
contact Technical Support within the FortiCare portal.
Bug ID Description
1024455 EAP-TLS computer authentication failure - Reason: Error in error - certificate verify failed.
1026189 EAP with NTLMv2 to Windows AD fails in 6.6.1 but works well in FortiAuthenticator 6.5.4.
1030796 Fortinet Single Sign-On Filtering Objects do not save after POST in REST API.
1032068 FortiAuthenticator is very slow to auto-delete logs. The gateway Timeout/ HTTP 504 error still occurs.
1033428 Trusted Endpoint SSO does not prompt for FIDO when 'Enforce MFA' option is selected.
1036821 After importing new users via import CSV file on FortiAuthenticator v6.6.1, the existing users on the
User group are removed.
1037883 Updated SMTP password does not take effect (old password still in use).
1037946 FortiAuthenticator does not send a random 64 character value but the placeholder itself.
1039024 FortiToken Mobile push notifications fails for units without a firmware certificate signed by FTNT CA2.
1041406 Token verification error when trying to send push to a token device without push registration ID.
1048329 FortiAuthenticator not logging SSH (CLI) access in the regular logs.
1050958 FortiAuthenticator does not allow creating new group objects to LDAP Service Directory Tree.
1060487 Unable to expand large list of LDAP users when using Google LDAP.
1061416 REST API command to create a user fails with 'Invalid time format. Time should be formatted using ISO-
8601.'
1062342 When importing CRL larger than 500 000 bytes, the FortiAuthenticator GUI shows error "CRL file
'test.crl' size is too large."
The following table lists the maximum number of configuration objects per FortiAuthenticator appliance that can be
added to the configuration database for different FortiAuthenticator hardware models.
The maximum values in this document are the maximum configurable values and are not a
commitment of performance.
Feature Model
System
Network Static 50 50 50 50 50 50 50 50
Routes
Messages SMTP 20 20 20 20 20 20 20 20
Servers
SMS 20 20 20 20 20 20 20 20
Gateways
SNMP 20 20 20 20 20 20 20 20
Hosts
Administrat Syslog 20 20 20 20 20 20 20 20
ion Servers
Language 50 50 50 50 50 50 50 50
Files
Authentication
General Auth 166 500 666 2666 3333 6666 13333 13333
Clients
(NAS)
Feature Model
Feature Model
FSSO FSSO 500 1500 2000 8000 10000 20000 2000003 200000
Users
Feature Model
Accounting Sources 500 1500 2000 8000 10000 20000 40000 40000
Proxy
Destinati 25 75 100 400 500 1000 2000 2000
ons
Certificates
User User 2500 7500 1000 40000 50000 10000 200000 200000
Certificates Certificat 0 0
es
Certificate CA 10 10 10 50 50 50 50 50
Authorities Certificat
es
Revocati
on Lists
SCEP Enrollme 2500 7500 1000 40000 50000 10000 200000 200000
nt 0 0
Requests
Services
2 FortiToken Mobile Licenses refers to the licenses that can be applied to a FortiAuthenticator, not the number of
FortiToken Mobile instances that can be managed. The total number is limited by the FortiToken metric.
3 For the 3000E model, the total number of concurrent SSO users is set to a higher level to cater for large deployments.
* Upper limit
The following table lists the maximum number of configuration objects that can be added to the configuration database
for different FortiAuthenticator virtual machine (VM) configurations.
The maximum values in this document are the maximum configurable values and are not a
commitment of performance.
The FortiAuthenticator-VM is licensed based on the total number of users and licensed on a stacking basis. All
installations must start with a FortiAuthenticator-VM Base license and users can be stacked with upgrade licenses in
blocks of 100, 1,000, 10,000 and 100,000 users. Due to the dynamic nature of this licensing model, most other metrics
are set relative to the number of licensed users. The Calculating metric column below shows how the feature size is
calculated relative to the number of licensed users for example, on a 100 user FortiAuthenticator]-VM Base License, the
number of auth clients (RADIUS and TACACS+) that can authenticate to the system is:
100 / 3 = 33
Where this relative system is not used e.g. for static routes, the Calculating metric is denoted by a "-". The supported
figures are shown for both the base VM and a 5000 user licensed VM system by way of example.
Feature Model
System
SMS Gateways 2 20 20 20
SNMP Hosts 2 20 20 20
Language Files 5 50 50 50
Authentication
Feature Model
Feature Model
Certificates
Services
2 FortiToken Mobile Licenses refers to the licenses that can be applied to a FortiAuthenticator, not the number of
FortiToken Mobile instances that can be managed. The total number is limited by the FortiToken metric.
Copyright© 2024 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s Chief Legal Officer, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.