| Description | This article explains the reason for the authentication failure of local users on FortiAuthenticator with the 'Administrator role' |
| Scope | FortiAuthenticator. |
| Solution |
FortiAuthenticator is the RADIUS server to the FortiGate that provides VPN Dialup IPSec with IKEv2 for the users.
For FortiGate configuration, refer to the following KB articles: Technical Tip: IKEv2 Dialup IPsec tunnel with RADIUS and FortiToken MFA Technical Tip: How to configure IPsec VPN Tunnel using IKE v2
The VPN login is created on FortiAuthenticator as a Local User with 'Administrator' role.
Upon connecting to the VPN the error message 'EAPPasswordError' is displayed on FortiClient. The FortiAuthenticator debug log shows the following errors:
2025-11-06T12:14:09.824668-03:00 FortiAuthenticator radiusd[8155]: (2) facauth: Local user found: test.ipsec
FortiClient will use EAP-MSCHAPv2 authentication by default. Please refer to the following documentation: EAP-TTLS support for IPsec VPN
The authentication for Local Users with the 'Administrator' role will not work because accounts with the 'Sponsor' or 'Administrator' role always use irreversible cryptography (i.e., bcrypt hash), while Local Users with the 'User' role use reversible cryptography (i.e., AES256). Refer to Local user account password storage
The Local Users with 'User' role will authenticate correctly. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.