Description | This article describes how the Explicit Proxy authentication timeout works. |
Scope | FortiGate. |
Solution |
Related article:
The following Authentication timeout timer is applied to Explicit Proxy Authentication. For information, proxy user list, and firewall user list are separate user lists, therefore there could be some misunderstandings. The link above explains timeouts for 'Firewall user list'.
# config system global
# config system global
Control users must re-authenticate after a session if it is closed if traffic has been idle, or from the point at which the user was first created.
Refer to the below article for Proxy user's lifetime control: https://community.fortinet.com/t5/FortiGate/Technical-Tip-Proxy-users-lifetime-control/ta-p/192401
Examples:
- If no traffic for 5 hours (300/60), the user will time-out, and need end-user auth again.
1) When 'proxy-auth-lifetime' is enabled and 'proxy-auth-lifetime-timeout' is set to a certain value, 'all' user information in wad will be removed when the 'proxy-auth-lifetime-timeout' timer expires. This timer starts ticking down when the user is created in wad.
2) The granularity of the 'proxy-auth-lifetime-timeout' timer is 5 minutes. That means if setting it to 5 minutes, the timer may time out after 5+5=10 minutes, if setting it to 30 minutes, it may time out after 30+5=35 minutes.
Where a scenario of LDAP authentication and FSSO CA exist to support authentication for none domain machines and joined domain machines, the 'proxy-auth-lifetime' will eventually conflict with the FSSO CA timer.
3) Starting FortiOS 7.0.1 there is an option to cache for a long time Windows LDAP user (for other vendors' LDAP server it is not acceptable).
# config web-proxy global
If the option above is enabled, 'proxy-lifetime-timeout' will not make any effects, because it will relay to cached info on the firewall itself. |