Created on
08-28-2023
09:25 PM
Edited on
07-27-2024
05:58 AM
By
Jean-Philippe_P
Description | This article describes that WSSO SSID users fail to authenticate when using a local group with a Radius server but can authenticate directly with Radius server authentication. |
Scope | FortiGate v6.x.x and v7.x.x. |
Solution |
Example: FortiGate uses authentication protocol Ms-Chap-v2 to connect with the Radius server and EAP is enabled on the NPS server:
On the FortiGate CLI:
diag debug app fnbamd -1 diag debug en
[587] __fnbamd_cfg_get_radius_list_by_group-Loading RADIUS server 'DC-RADIUS' for usergroup 'WiFi' (4)
In the above debugs, FortiGate still uses PAP for the Local Group even when MS-Chap-v2 is configured on the Radius server settings. Due to this, these users are unable to authenticate.
FortiGate does not force the authentication protocol for SSID authentication. PEAP authentication needs to be enabled on the end devices. If the end user is a Windows PC, it is necessary to enable EAP-MSCHAP-v2 in the wireless network security of the PC.
Related article: Configuring WiFi with WSSO using Windows NPS and user groups |