Description | This article describes how to enforce HSTS on FortiAuthenticator. |
Scope | FortiAuthenticator. |
Solution |
RFC 6797 (HSTS) is not a vulnerability, but a mitigation instead. HSTS was introduced specifically to prevent SSL stripping and Man-in-the-middle attacks, as it is a web security policy mechanism that allows a web server to declare that browsers (or other complying user agents) should only interact with it using secure HTTPS connections.
The FortiAuthenticator is NOT enforcing HSTS by default, and this is an expected behavior. If the FortiAuthenticator is being scanned by any vulnerability checking tools, the following result might be seen:
The HTTPS server is **not including** the 'Strict-Transport-Security' header in its responses. This means browsers might allow users to access the site via unencrypted HTTP after a redirect or in case of downgrade attacks.
Behind the scenes, the FortiAuthenticator will not send the following HTTP response header by default:
To force FortiAuthenticator to respond twith he HTTP response header above, it requires making the following changes: Log in to FortiAuthenticator GUI -> System Access -> GUI Access and enable 'HTTP Strict Transport Security (HSTS) Expiry'. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.