Description |
This article describes the setup to configure certificate authentication using a wildcard PKI user for SSID on the FortiGate. |
Scope | FortiGate v7.4.2 or later. |
Solution |
FortiOS v7.4.2 or later supports certificate WPA2-enterprise authentication using wildcard PKI user.
Follow the below steps to configure the NPS and the FortiGate:
For this demonstration, the Root CA signed the certificate for the end user certificate.
config user radius edit "wsso-radius" set server "10.0.11.250" set secret ENC xxxxyyyyzzzz set auth-type ms_chap_v2 set account-key-processing strip next end
config user peer edit "wsso-pki" set ca "CA_Cert_1" set mfa-mode subject-identity set mfa-server "wsso-radius" next end
config user group edit "Devices-Group" set member "wsso-pki" "wsso-radius" config match edit 1 set server-name "wsso-radius" set group-name "Devices" next end next end
config wireless-controller vap edit "wsso" set ssid "wsso" set security wpa2-only-enterprise set pmf enable set auth usergroup set usergroup "Devices-Group" set schedule "always" next end
From the end-user machine try to connect to the WiFi SSID, select the user certificate to authenticate, and trust the certificate provided by the FortiGate. To change this certificate provided by the FortiGate, Navigate to WiFi & Switch Controller -> WiFi Settings then change WiFi Certificate and WiFi CA Certificate.
After successful authentication, use the below command to check the connected user:
diagnose firewall auth list 10.0.97.2, wsso-pki type: wsso, id: 0, duration: 12, idled: 0 expire: 120, allow-idle: 120 flag(100): wsso packets: in 170 out 174, bytes: in 68931 out 53868 group_id: 5 ----- 1 listed, 0 filtered ------
Troubleshooting: Execute the following commands to enable debugging on the FortiGate, then reproduce the issue if there is one:
diagnose debug console timestamp enable diagnose debug app fnbamd -1 diagnose debug app eap_proxy -1 diagnose debug enable |