FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
CarlosColombini
Staff & Editor
Staff & Editor
Article Id 202361
Description

This article describes a limitation of certain MFA methods for Azure AD and NPS Extension.

 

While authentication and delivery of MFA codes works with Azure NPS Extension, Radius Attributes configured in NPS policies will not be forwarded to Radius Client if the following MFA methods are used:

- SMS.
- Mobile App.
- OATH Hardware Token.

Scope SSL-VPN and Azure NPS Extension for MFA.
Solution

It is known that it is possible to match specific groups created on FortiGate based on Radius Attributes configured in NPS policies.

Refer the Article below for this configuration:
https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-define-group-based-authorization/ta...

 

Considering that Azure AD integration with NPS Servers and MFA are becoming more popular every day, the use of Microsoft NPS Extension in Azure is required.

This all works well, but there is one caveat depending on the delivery method of the MFA code.

 

If the user needs to manually insert the Token from SMS, mobile app or hardware token, the Radius attributes configured in the NPS policy will not be forwarded, therefore, group matching will behave unexpectedly.

 

This is a limitation on the Microsoft NPS Extension, and they have updated their documentation. Please see below:

https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-nps-extension

 

CarlosColombini_1-1641155587084.png

 


A possible workaround in cases where push notifications are not possible and yet group matching is needed, is to make use of NAS IP to differentiate each group being mapped to each radius server created on FortiGate.

 

See the below high level steps:

1) Create separate Radius Servers with individual NAS IP configured.


2) Associate each Firewall Group with one Radius Server.


3) Associated proper groups to firewall policies and SSL VPN Portal Mappings.


4) Create one Connection Request Policy with NAS IP as condition that will be used for each group.


5) Create one Network Policy with condition set to NAS IP and Windows AD Group.

 

With that set, even though the VSA (Vendor Specific Attributes) from NPS policies are not forwarded, the match is being done by the conditions set to the Connection Request and Network Policies.