Description
This article describes how to configure FortiToken mobile push notifications.
FortiToken Mobile push notifications let users approve or deny multi-factor authentication (MFA) requests directly on their mobile device. This document explains the FortiToken Mobile push flow, FortiGate configuration, and common troubleshooting checks.
FortiGate running FortiOS that is configured to use FortiToken Mobile for MFA (for example, SSL VPN or administrative access). Examples reference 7.x style configuration. Always confirm the exact CLI options depending on the FortiOS version.
Scope
FortiGate / FortiOS
Solution:
FortiGates with associated mobile FortiTokens can be configured to send push notifications: Instead of requiring users to submit the token code manually, it can simply confirm the login attempt on the same mobile their token is registered on.
Apple (APNS) and Google (GCM/FCM) provide the push service for iPhone and Android, respectively. This helps to avoid locking Tokens after disabling an already enabled two-factor authentication user.
FortiToken Mobile Push notifications can be configured via CLI only. If in multi-VDOM mode, ftm-push is configured in global VDOM.
FortiToken Mobile Push includes the following configurations depending on the version of FortiGate :
Example 1 (common in 7.x CLI references):
config system ftm-push
set status enable
set server <public-ip-or-fqdn>
set server-port 4433
set server-cert "Fortinet_Factory"
set proxy enable
end
Example 2 (seen in some cookbook examples):
config system ftm-push
set status enable
set server-ip <public-ip-address>
set server-port 4433
end
Notes:
It is possible to configure one IP address at a time under 'server-ip' or 'server'.
Warning:
In FortiOS v6.4.10 up to FortiOS v7.4.0 inclusive, unset server-ip and use server configuration only. In these firmware versions, the 'set server-ip' setting is non-functional but still appears in configuration. Attempting to configure it will print the following error message.
config sys ftm-push
set server-ip X.X.X.X
Missing server address.
object check operator error, -56, discard the setting
Command fail. Return code -56
'set server-ip' is fully removed as of FortiOS v7.4.1.
In FortiOS v6.4.10 onwards, the 'set server' command is used. This setting provides the flexibility to use a domain name or an IP.
config sys ftm-push
set server site-a.example.com
end
Or:
config sys ftm-push
set server X.X.X.X
end
If the device has a dynamic public IP address:
config system ftm-push
set interface "wan1"
end
Or:
config system interface
edit <wan-interface>
set allowaccess ftm
next
end
Configuring both 'set server' and 'set interface' is not supported, and if configured will print an error:
config sys ftm-push
set interface "wan1"
set server site-a.example.com
end
set either interface or server but not both.
attribute 'interface' set operator error, -651, roll back the setting
Command fail. Return code -651
Starting with v7.6.4, server IP/FQDN be configured through the GUI, see Technical Tip: Changing port for push notification configuration.
The push notification process runs as follows:
Requirements for FortiToken Mobile push to work properly.
config system interface
edit <name>
set allowaccess ftm ping
next
end
If FortiGate sits behind an upstream NAT device, forward the chosen callback port (for example, TCP/4433) from the public IP to the FortiGate interface where 'allowaccess ftm' is enabled. Ensure upstream firewall policy allows the inbound connection.
CLI:
config user radius
edit <RADIUS server name>
set timeout <value, e.g. 30>
end
Note:
IKEv1 does not support FortiToken Mobile Push. If FortiToken Mobile Push is enabled globally on the FortiGate, FortiToken Mobile Users will not be able to login to IKEv1 dialup VPN.
Push notifications are supported for IPsec (IKEv2) starting from:
FortiClient versions:
More information on supported versions can be found in the article Technical Tip: Required firmware/software versions for using FortiToken Mobile or OTP MFA with Forti....
The IPSec dial-up connection with an IOS device will fail to connect if using the FortiToken MFA, as it will not receive the token push. As a workaround, include the token in the password field while connecting:
The user will enter p@ssw0rd345678 when prompted for the password.
Related documents:
Troubleshooting Tip: FTM-Push notification configured but not working
Technical Tip: How to provision FortiToken cloud
Technical Tip: FortiGate support for FTM push for firewall policy authentication
Technical Tip: FTM Push Notification failing with Error - 'Token denied or timeout (-7105)'
Technical Tip: FortiToken Push on FortiAuthenticator: operation flow and details
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.