Created on 09-24-2023 11:11 PM Edited on 09-25-2024 01:24 PM By Jean-Philippe_P
Description |
This article describes how to configure Multiple FSSO Agent to Connect to Multiple FSSO CA Server Monitoring same Domain/Groups.
The second FSSO Agent (FSSO_DC2) is also configured with 'User group source' as Collector Agent and is on connected status. However, there are no users/Groups monitored for the second FSSO Agent.
Summary of FSSO Agent Status:
|
Scope | FortiGate, FSSO. |
Solution |
Running the debug application on the AUTHD process shows the below logs and error:
<> _process_ad_info[FSSO_DC2]: group TEST-DOMAIN/CERT PUBLISHERS exists (vd=root) _process_ad_info[FSSO_DC2]: group TEST-DOMAIN/RAS AND IAS SERVERS exists (vd=root) _process_ad_info[FSSO_DC2]: group TEST-DOMAIN/ALLOWED RODC PASSWORD REPLICATION GROUP exists (vd=root) _process_ad_info[FSSO_DC2]: group TEST-DOMAIN/DENIED RODC PASSWORD REPLICATION GROUP exists (vd=root) _process_ad_info[FSSO_DC2]: group TEST-DOMAIN/DNSADMINS exists (vd=root) _process_ad_info[FSSO_DC2]: updated user.adgrp with 0 entries
Thus, it is not possible to reference it to FSSO_DC2.
set server-name "FSSO_DC1" next edit "TEST-DOMAIN/RAS AND IAS SERVERS" set server-name "FSSO_DC1" next edit "TEST-DOMAIN/ALLOWED RODC PASSWORD REPLICATION GROUP" set server-name "FSSO_DC1" next edit "TEST-DOMAIN/DENIED RODC PASSWORD REPLICATION GROUP" set server-name "FSSO_DC1" next edit "TEST-DOMAIN/DNSADMINS" set server-name "FSSO_DC1" next
This requires configuring the LDAP Server. Refer to the below guide to configure the LDAP Server:
'Right-click' to User or Groups to monitor, then select 'Add Selected'.
It is now possible to see that there are 2 Users/Groups that are currently monitored by FSSO CA:
The recommendation and regular use of FSSO connectors is to use a single Collector Agent entry with primary and secondary IP.
Note: FortiGate will connect to a single IP only and forward the group filter to the Collector Agents. The other Collector Agent will not receive the group filter and troubleshooting a missing user should be done first on FortiGate, then on the connected Collector Agent. Checking the non-connected Collector may not give good results since the user's absence, or presence does not represent what FortiGate has listed.
When troubleshooting such a setup, the mouse over the FSSO connector will display an entry in bold. That is the connected IP/FQDN. In CLI, this can be made visible with:
diag debug enable diag debug auth fsso server-status |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.