Created on
07-26-2023
07:53 AM
Edited on
03-24-2025
08:04 AM
By
Jean-Philippe_P
Description | This article describes how to reset local users' password that resides on FortiAuthenticator database. |
Scope | FortiGate, FortiAuthenticator. |
Solution |
Let's presume that SSL VPN authentication is configured between FortiGate and FortiAuthenticator. The configuration part is described in the below documentation:
In this case, local user groups on FortiAuthenticator are used instead of remote LDAP users. When creating a local user there is an option on FortiAuthenticator to 'Force change password on next logon'.
To be able to reset on the FortiGate side as Authentication Method should be used MS-CHAP-v2, using PAP will not be triggered to change the password on the next logon.
This is tested from Webmode of the SSL VPN link on FortiGate.
It is possible to run the debug logs on the FortiGate CLI side :
diagnose debug application fnbamd -1 diagnose debug application sslvpn -1 diagnose debug enable
root:f9]fam_auth_send_req:1007 task finished with 4
sent radius req to server 'FAC': fd=12, IP=x.x.x.x:1812) code=1 id=31 len=185 user="genci" using MS-CHAPv2
fnbamd_radius_auth_validate_pkt-RADIUS resp code 3
auth_proc_resp:1359 fnbam_auth_update_result return: 2 (challenged) <-- Challenged means that password was expired.
nbamd_radius_auth_validate_pkt-RADIUS resp code 2 <-- An access-accept has been granted.
fnbamd_auth_handle_radius_result-->Result for radius svr 'FAC' 10.191.21.11(1) is 0
fam_auth_proc_resp:1359 fnbam_auth_update_result return: 0 (success) :root:fb]fam_do_cb:667 fnbamd return auth success. <-- Authentication success.
Related Articles: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.