Solution |
Topology:

Follow these steps below to start the configuration.
- Add FortiAuthenticator on a specific domain. Enable the option 'Windows Active Domain Authentication'.

- After adding the FortiAuthenticator on a domain, check the results under Monitor -> Authentication -> Windows AD.

- Open the FortiNAC and go to the Network -> RADIUS -> Proxy and add the FortiAuthenticator settings.
- While still on the FortiNAC, go to Network -> Inventory, select the switch configured to connect the workstation, enable the option Radius authentication, and select Proxy as the Mode. Choose the FortiAuthenticator and insert the Shared Secret.

- Go to FortiAuthenticator to configure the RADIUS Client, Realm, and policy to authenticate the workstation (User and Machine).
- Go to Authentication -> RADIUS Service -> Clients.
- Add the client with the correct RADIUS secret.

- Go to User Management -> Realms to add a realm to be used in a RADIUS policy. Select the LDAP server configured before as a source.
- Go to Authentication -> Radius Service -> Policies.
- In the RADIUS Client, add the FortiNAC configured as a client before.

Under the Authentication Type, select Access EAP and PEAP.

- Under Identity Sources, check the option 'Use default realm...'. Enable the option to use Windows AD Authentication and filter by a group. This group needs to have all members who will be authenticated (users and machines). If necessary, add more than one group.

- In Authentication Factors, under Device authorization, enable the option 'Windows AD computer authentication'.

- After all these configurations, the switch must be configured to enable 802.1x authentication on its interfaces. This article does not cover this configuration.
- Enable the 802.1x supplicant in the workstation (Windows) starting the service called 'Wired AutoConfig'.
- Go to the network interfaces on Windows, right-click it, and go to properties.
- Go to the Authentication tab and enable the option 'Enable IEEE 802.1x authentication'.
- Choose the 'Microsoft: Protected EAP (PEAP)' method.
- Select the Additional Settings button and set the option 'Specify authentication mode' to 'User or computer authentication'.
- Return to the Authentication tab and select the Settings button.
- Check the option 'Enable Fast Reconnect', uncheck all other options, and select 'Secured Password (EAP-MSCHAP-v2)' as the authentication method.
- Select the Configure button and check the option to Automatically use Windows logon.
- Select the OK button to save these configurations. If all configurations work as expected, the user will be authenticated using the 802.1x protocol.
To check the logs, go to the FortiAuthenticator debug page with the FortiAuthenticator IP: https://<FortiAuthenticator_ IP>/debug
Go to Radius -> Authentication.
Select the 'Enter debug mode' button.
User authentication log successful.
2025-03-06T17:22:14.516022-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: ===>NAS IP:172.16.1.121
2025-03-06T17:22:14.516071-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: Comparing client IP 172.16.1.121 with authclient FSW-SITE-A (192.168.5.3, 1 IPs)
2025-03-06T17:22:14.516153-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: Comparing client IP 172.16.1.121 with authclient SW-ACCESS-SITE-A (192.168.5.2, 1 IPs)
2025-03-06T17:22:14.516199-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: Comparing client IP 172.16.1.121 with authclient FortiNAC (172.16.1.121, 1 IPs)
2025-03-06T17:22:14.516261-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: ------> matched!
2025-03-06T17:22:14.516325-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: Found authclient from preloaded authclients list for 172.16.1.121: FortiNAC (172.16.1.121)
2025-03-06T17:22:14.516368-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: authclient_id:2 auth_type:'password'
2025-03-06T17:22:14.518474-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: Found authpolicy 'POL-AUTH-802.1X-MSCHAP' for client '172.16.1.121'
2025-03-06T17:22:14.518538-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: Client type: external (subtype: radius)
2025-03-06T17:22:14.518580-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: Input raw_username: (null) Realm: (null) username: LAB\agomes
2025-03-06T17:22:14.518709-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: Searching default realm as well
2025-03-06T17:22:14.518759-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: Realm not specified, default goes to Windows AD, id: 1
2025-03-06T17:22:14.519010-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: Loaded remote ldap (regular bind) 172.16.1.253:389
2025-03-06T17:22:14.519064-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: Strip off domain/realm prefix 'LAB' in username 'LAB\agomes'
2025-03-06T17:22:14.519972-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: skip ldap user search
2025-03-06T17:22:14.520017-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: User [enable fido: false, token count: 0, revoked_token_count: 0]
2025-03-06T17:22:14.520060-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: Policy [fido_auth_opt: disabled, twofactor: allow both, no_fido: two factor, revoked: reject]
2025-03-06T17:22:14.520102-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: Decided on [is_fido: false, two_factor: allow both, token_type: none]
2025-03-06T17:22:14.528501-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: machine auth override: authpolicy_id 4 auth_result 0
2025-03-06T17:22:14.529850-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: EAP authentication success - add configured radius attributes to response
2025-03-06T17:22:14.532748-03:00 FortiAuthenticator radiusd[7548]: (16) facauth: Updated auth log 'LAB\agomes': 802.1x authentication successful
Machine authentication log successful.
2025-03-06T17:30:31.057221-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: ===>NAS IP:172.16.1.121
2025-03-06T17:30:31.057232-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: Comparing client IP 172.16.1.121 with authclient FSW-SITE-A (192.168.5.3, 1 IPs)
2025-03-06T17:30:31.057236-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: Comparing client IP 172.16.1.121 with authclient SW-ACCESS-SITE-A (192.168.5.2, 1 IPs)
2025-03-06T17:30:31.057240-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: Comparing client IP 172.16.1.121 with authclient FortiNAC (172.16.1.121, 1 IPs)
2025-03-06T17:30:31.057244-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: ------> matched!
2025-03-06T17:30:31.057248-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: Found authclient from preloaded authclients list for 172.16.1.121: FortiNAC (172.16.1.121)
2025-03-06T17:30:31.057252-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: authclient_id:2 auth_type:'password'
2025-03-06T17:30:31.058077-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: Found authpolicy 'POL-AUTH-802.1X-MSCHAP' for client '172.16.1.121'
2025-03-06T17:30:31.058103-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: Client type: external (subtype: radius)
2025-03-06T17:30:31.058108-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: Input raw_username: (null) Realm: (null) username: host/WKS-SITE-A.lab.local
2025-03-06T17:30:31.058112-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: Searching default realm as well
2025-03-06T17:30:31.058117-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: Realm not specified, default goes to Windows AD, id: 1
2025-03-06T17:30:31.058124-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: Loaded remote ldap (regular bind) 172.16.1.253:389
2025-03-06T17:30:31.058131-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: Device authentication requested.
2025-03-06T17:30:31.058551-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: get_rldap_user_attr: Skip ldap search for Windows AD machine account
2025-03-06T17:30:31.058558-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: User [enable fido: false, token count: 0, revoked_token_count: 0]
2025-03-06T17:30:31.058564-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: Policy [fido_auth_opt: disabled, twofactor: allow both, no_fido: two factor, revoked: reject]
2025-03-06T17:30:31.058569-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: Decided on [is_fido: false, two_factor: allow both, token_type: undefined]
2025-03-06T17:30:31.114015-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: machine auth override: authpolicy_id 4 auth_result 1
2025-03-06T17:30:31.114498-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: EAP authentication success - add configured radius attributes to response
2025-03-06T17:30:31.114544-03:00 FortiAuthenticator radiusd[7548]: (28) facauth: Updated auth log 'host/WKS-SITE-A.lab.local': 802.1x authentication successful
|