This forum is for all security enthusiasts to discuss Fortinet's latest & evolving technologies and to connect & network with peers in the cybersecurity hemisphere. Share and learn on a broad range of topics like best practices, use cases, integrations and more. For support specific questions/resources, please visit the Support Forum or the Knowledge Base.
Hello, everybody,
I have FSSO configured on FG-VM. The users from required AD group (Domain Users) are not allowed to get Internet access. What most likely could be the problem?
I've installed DC agent on my controller. Configured "LDAP Servers" and "Single Sign-On" - there are full connectivity and I can get groups from my AD on Forti. The testing machine is the domain machine, for sure. Forti Agent gets all info about logons on DC.
Then I've created rule:
Name: VSYO
Incoming Interface: (port1)
Outgoing Interface: (port2
Source: all
Destination: all
Schedule: always
Service: ALL
With this rule all users could get Internet access.
Then I've added the required AD group:
Name: Full_Access_Users
Incoming Interface: Internal (port1)
Outgoing Interface: External (port2)
Source: all & Domain Userz (users group)
Destination: all
Schedule: always
Service: ALL
And no one could get the Internet access.
What is wrong? My actual conf is attached. Please, help me.
Many thanks in advance,
Ilya
Hello Illya,
Following your configuration I would suggest you to remove the LDAP setting in the SSO Server "Baileys":
# config user fsso
# edit Baileys
# unset ldap-server
# end
Afterward, you can edit the "Domain Userz" group, by selecting the FSSO group (see attached PNG).
Hope this will help.
Regards,
Sebastien
Hi, Sebastien,
I am not following you - why should I change Domain Userz group type? It's FSSO already.
The problem occured in two diferrent environments (different customers). Both FGs are VMs 5.6.
Thank you.
Hi,
Sorry, I mistyped, it wasn't a configuration suggestion, just a check that I proposed to bu sure that the AD/groups retrieved by the FSSO appear correctly in the "Domain Userz".
My idea is jsut 1st to remove the ldap settings you have in the "Baileys" (usually this setting in the FSSO configuration is used to avoid reaching the limit of group entries retrieved by the FSSO agent.) and give a test like this.
Thank you for the feedback.
Regards,
Sebastien
okay, that's a progress :).
Now I see that the user "semonov" has no group in the monitor screenshot.
Can you issue these two commands after trying to access internet with user SEMONOV?
# diagnose debug auth fsso list | grep -i -A 5 SEMONOV
# diagnose sys session list | grep -i -C 5 SEMONOV
The idea is to check if this user is properly associated to the group Domain Userz and the corresponding policy.
If the output returns nothing, we might have to check the FSSO Collector Agent settings (if I remember well, you can export its configuration, if so, can you please post it?)
Regards,
Sebastien
Hi, Sebastien,
this your recommendation solved the issue. Many thanks to you!
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.