Created on 09-21-2023 09:36 AM Edited on 09-22-2023 01:18 AM By Jean-Philippe_P
Description |
This article describes how to configure FortiAuthenticator as a TACACS+ server for FortiAnalyzer/FortiManager user authorization. FortiAuthenticator can perform central authentication as TACACS+ Server and Authorize the admin profile used on FortiAnalyzer/FortiManager. |
Scope | Specific users on FortiAuthenticator should be able to authenticate and access the FortiAnalyzer / FortiManager with the appropriate admin profile. |
Solution |
Generic TACACS+ configuration information can be found for both FortiAnalyzer/FortiManager and FortiAuthenticator products in the Fortinet Document Library.
For Example:
FortiAnalyzer:
FortiManager:
FortiAuthenticator:
Configuring FortiAuthenticator Authorization: The below is an Authorization Service that when configured can be allowed in an Authorization Rule and will return the appropriate Vendor-Specific Attributes (VSAs) to the FortiAnalyzer/FortiManager during authentication/authorization.
Go to Authentication -> TACACS+ Service -> Authorization, and select Services from the top right menu.
Note: If the 'set ext-auth-adom-override' option has been set to 'enable' under the admin user configuration on the FortiAnalyzer/FortiManager, then the ADOM VSA can also be configured on the FortiAuthenticator if required (example below):
Go to Authentication -> TACACS+ Service => Authorization, and select Rules (default) from the top right menu.
Configuring FortiAnalyzer/FortiManager Authentication: Add TACACS+ server. config system admin tacacs
Add TACACS+ wildcard user.
config system admin user
Troubleshooting Authentication Issues on FortiAnalyzer/FortiManager:
diagnose debug application auth 8 diagnose debug enable |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.