Description
This article describes how to configure and import YubiKeys to FortiAuthenticator, for two-factor authentication.
Note:
This process applies exclusively to importing YubiKey models that support the OATH-HOTP function (HMAC-based OTP token code generator, analogous to FortiToken 200 series and FortiToken mobile), to be used for this purpose.
For FIDO2 functionality, this article is not applicable. FIDO2 keys are not pre-imported, they are assigned at the moment of self-registration by user, or when an administrator manually assigns one to a user.
Useful links:
External
YubiKey Personalization tool (required to configure YubiKeys): https://www.yubico.com/products/services-software/download/yubikey-personalization-tools/
Solution
In the Settings tab, ensure that Logging has enabled output and “traditional” format is set.
In the OATH-HOTP tab, choose the advanced configuration version. Select which slot to configure. The slots differ in how they are triggered:
Slot 1 - triggered after a short press of the button
Slot 2 - triggered after a three-second press of the button
Configure these options to ensure compatibility with FortiAuthenticator:
Once configuration is done, click "Write Configuration". It will be required to choose a location for the log file, unless this was already done before. Continue with configuring other YubiKeys in the same manner (make sure they have unique Identifier and secret keys). The resulting csv file with configurations for all reprogrammed YubiKeys will be used for importing them into the FortiAuthenticator.
Go to Authentication -> User Management -> FortiTokens -> Import
Select file type "Yubikey file" and then choose the CSV file from step 1.
Note 1: If the error "Invalid Yubikey file, header is missing" is shown, verify that correct file is selected.
Note 2: If yes, also make sure that the first line of the file says "LOGGING START" (this is the expected header).
Once done, a message that the tokens were successfully imported will be shown.
On this screen it's possible to edit the tokens and synchronize them.
The relevant options are:
The resulting behavior is as follows:
Verification:
If self-service portal is configured, log out and then attempt to log back in as the user with YubiKey assigned.
It's also possible to attempt to authenticate over RADIUS with this user account. If the RADIUS client profile is set to request two factor token codes, log in with a code generated by the YubiKey.
Example token code generated:
ubnu4949510814552744
This code consists of two parts: The YubiKey identifier (“ubnu49495108”) + the actual code that changes for every use (“14552744”; six or eight digits, depending on the configuration from step 1.
How to match a YubiKey to its serial number in FortiAuthenticator?:
If it is not sure which serial number matches to a certain YubiKey, use the following procedure to identify it:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.