
Created on 02-16-2021 09:18 AM Edited on 05-25-2022 10:54 AM By Anonymous
Description
This article describes how to allow FortiGate to recognize users as members of multiple groups when authenticating via Captive Portal.
Solution
When FortiGate authenticates a user via VPN, it will automatically fetch group memberships and recognize which groups on the FortiGate this user would match.
This way, only one group needs to be used for SSL VPN authentication, but additional groups may be used in policies for granular access control.
This is not the case with Captive Portal (policy-based or interface-based).
If a group is targeted by Captive Portal authentication, FortiGate will only consider an authenticated user as member of this group, not any others the user might also be a member of.

There are two solutions:
- Set 'allow all'.
Any user that is a member of any group on the FortiGate will be able to authenticate (via LDAP, local authentication, RADIUS; whatever is configured on FortiGate).
- Add multiple groups to the Captive Portal.
If the user is member of multiple groups, the FortiGate will register membership in any group that is outright referenced in Captive Portal.
