Description | This article describes why, and how FortiGate creates a 'guest' user, a member of 'SSO_Guest_Users'. |
Scope | FortiGate v7.0.x, and all other newer branches. |
Solution |
FortiGate populates, and generates a 'guest' user (member of SSO_Guest_Users) logon event, if all three clauses are matched consequently:
This logon event could lead to mismatching logged-on FSSO user's traffic to the appropriate firewall policy, since the FortiGate keeps both users' sessions - guest user, and proper FSSO user. For example, each application in the backend generates traffic towards public IPs (anti-viruses, browsers, etc), it means this 'guest' user could appear immediately once the host is turned on. Later, a domain user logs on to the workstation and generates FSSO logon event. As a result, FortiGate will keep both users sessions.
Example 1:
To demonstrate the behavior, the 'guest' user was unauthenticated, and the workstation rebooted. As a result, some applications generated traffic, and the guest user was populated. A gap in the outputs below was created during the rebooting of the host:
Example 2: The user is a member of the 'CN=GR-001' FSSO group. After logging in to the workstation, there are two logon events:
Example 3: 'solution':
Related articles: Technical Note : Details about 'FSSO Guest Users' Technical Note: Unauthenticated users are not identified as 'guest' |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.