Created on
04-08-2022
02:24 AM
Edited on
02-09-2024
05:14 AM
By
Anthony_E
Description | This article describes how to force Kerberos authentication on Fortigate running as a proxy(Explicit/Transparent). |
Scope |
This article does not cover all the steps on how to configure the proxy and authentication. This article assumes that the Proxy and authentication are already configured and Kerberos authentication has to be forced by FortiGate |
Solution |
To force the Kerberos authentication several conditions have to be met:
1) On the proxy client:
- By default, Windows will not attempt Kerberos authentication if the proxy server hostname is configured as an IP address. It will fall back to other enabled authentication protocols like NTLM.
Make sure that the proxy server address on the client is configured as the hostname, which is defined as FQDN. In our case it is: fgt.test.lab.
The proxy client will use that FQDN as the Service Principal Name to trigger the Kerberos authentication.
A Service Principal Name is a unique identifier used during Kerberos authentication to identify a service on the network. In our case, the service on the network is the Fortigate acting as a web proxy.
- The proxy client has to be able to resolve the FQDN of the proxy server as the IP address of the interface, where the Fortigate is expecting connections from the proxy clients.
2) On the FortiGate:
# config system global
# config system dns
# config web-proxy global
# config system interface
# config authentication scheme
# config authentication rule
Note. FortiGate does not have the Kerberos method, it is selected during the authentication negotiation between the proxy and the client. To make sure that FortiGate will trigger the Kerberos authentication, NTLM negotiation also has to be disabled.
3) The DNS server, that is used by the proxy clients to resolve the hostnames has to have an A record for the FQDN of the Proxy server.
Meaning that the proxy clients have to be able to resolve FQDN fgt.test.lab as 192.168.100.1. |