FortiAuthenticator
FortiAuthenticator provides centralized authentication services for the Fortinet Security Fabric including multi-factor authentication, single sign-on services, certificate management, and guest management.
kwcheng__FTNT
Article Id 398958
Description This article describes how to enforce HSTS on FortiAuthenticator.
Scope FortiAuthenticator.
Solution

RFC 6797 (HSTS) is not a vulnerability, but a mitigation instead.

HSTS was introduced specifically to prevent SSL stripping and Man-in-the-middle attacks, as it is a web security policy mechanism that allows a web server to declare that browsers (or other complying user agents) should only interact with it using secure HTTPS connections.

 

The FortiAuthenticator is NOT enforcing HSTS by default, and this is an expected behavior. If the FortiAuthenticator is being scanned by any vulnerability checking tools, the following result might be seen:

 

The HTTPS server is **not including** the 'Strict-Transport-Security' header in its responses. This means browsers might allow users to access the site via unencrypted HTTP after a redirect or in case of downgrade attacks.

 

Behind the scenes, the FortiAuthenticator will not send the following HTTP response header by default:

  • Strict-Transport-Security: max-age=31536000

 

To force FortiAuthenticator to respond twith he HTTP response header above, it requires making the following changes:

Log in to FortiAuthenticator GUI -> System Access -> GUI Access and enable 'HTTP Strict Transport Security (HSTS) Expiry'.