Description | This article describes how to reset local users' password that resides on FortiAuthenticator database. |
Scope | FortiGate, FortiAuthenticator. |
Solution |
Let's presume that SSL VPN authentication is configured between FortiGate and FortiAuthenticator. The configuration part is described in the below documentation.
In this case, local user groups on FortiAuthenticator is used instead of remote ldap users. When creating a local user there is an option on FortiAuthenticator to 'Force change password on next logon'.
In order to be able to reset on the FortiGate side as Authentication Method should be used MS-CHAP-v2, using PAP will not be triggered to change the password on the next logon.
This is tested from Webmode of the SSL VPN link on FortiGate.
It is possible to run the debug logs on the FortiGate CLI side :
diag debug application fnbamd -1 diag debug application sslvpn -1 diag debug enable
root:f9]fam_auth_send_req:1007 task finished with 4
sent radius req to server 'FAC': fd=12, IP=x.x.x.x:1812) code=1 id=31 len=185 user="genci" using MS-CHAPv2
fnbamd_radius_auth_validate_pkt-RADIUS resp code 3
auth_proc_resp:1359 fnbam_auth_update_result return: 2 (challenged) <-- challenged means that password was expired.
nbamd_radius_auth_validate_pkt-RADIUS resp code 2 <-- an access-accept has been grant.
fnbamd_auth_handle_radius_result-->Result for radius svr 'FAC' 10.191.21.11(1) is 0
fam_auth_proc_resp:1359 fnbam_auth_update_result return: 0 (success) :root:fb]fam_do_cb:667 fnbamd return auth success. <-- authentication success. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.