Created on 09-24-2020 12:37 AM Edited on 01-30-2024 02:31 AM By Kate_M
Description
This article describes how to setup SSL VPN with client authentication using certificate and second factor authentication.
Scope
In this scenario, general SSL VPN configuration is setup already.
Related document.
https://docs.fortinet.com/document/fortigate/6.0.0/cookbook/690301/configuring-the-ssl-vpn-tunnel
Solution
1) Install the server certificate. The server certificate is used for authentication and for encrypting SSL VPN traffic.
- Go to System -> Feature Visibility and ensure 'Certificates' is enabled.
- Go to System -> Certificates and select 'Import' -> Local Certificate.
- Set Type to Certificate.
- Choose the Certificate file and the Key file for the certificate, and enter the Password.
- If required, change the 'Certificate Name'.
The server certificate now appears in the list of Certificates.
2) Install the CA certificate.
The CA certificate is the certificate that signed both the server certificate and the user certificate. In this example, it is used to authenticate SSL VPN users.
- Go to System -> Certificates and select 'Import' -> CA Certificate.
- Select Local PC and then select the certificate file.
The CA certificate now appears in the list of External CA Certificates. In this example, it is called CA_Cert_1.
3) Configure PKI users and a user group.
- To use certificate authentication, use the CLI to create PKI users.
# config user peer
edit "pki01"
set ca "CA_Cert_1"
set subject "user"
set two-factor enable <-----
set passwd pa$$word
next
end
- Ensure that the subject matches the name of the user certificate. In this example, user.
- When a PKI user is created, a new menu is added to the GUI.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.