Created on 09-30-2024 09:49 PM Edited on 11-28-2024 09:18 PM By jlim11
Description | This article describes a workaround for captive portal authentication when it is blocked on Chrome due to HSTS enforcement (updated versions of Chrome). |
Scope | FortiGate. |
Solution |
While using Chrome browser users are not getting the authentication page (it happens with new updated versions of Chrome). This happens when browsing specific sites before authentication (for example google.com) on Chrome.
Once HSTS is enabled, a timeout will be sent with the HTTPS header that contains an HSTS TTL 'Strict-Transport-Security: max-age=31536000'. The certificate received from the site will be honored until the timeout expires. Future attempts to access the site will reference the certificate and, if the certificate does not match, the browser will not allow the connection to the site to be established.
While using the FortiGate captive portal, when users first browse e.g: google.com the session is intercepted and redirected to the captive portal address, the redirected communication uses FortiGate's self-sign or user's imported CA cert (3rd part signed ) and Chrome does not allow the cert for HSTS enabled sites (google.com).
Users will see the following error:
The issue can be resolved by enabling secure authentication, as shown below:
MAIN_FW (setting) # show
After the above changes, download the 'Fortinet_CA_SSL' certificate from the FortiGate firewall and install it on all end-users PCs.
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.