| Description | This article describes how to integrate FortiGate with Aruba ClearPass to support multiple user roles. |
| Scope | FortiGate. |
| Solution |
The FortiGate can integrate with ClearPass through RSSO. To apply RSSO policies across different profiles, there is a simple method that makes the process straightforward. On the ClearPass side, the administrator needs to add the FortiGate as a NAS client and use the same pre-shared key that is configured for 802.1X communication between the Wi-Fi controller and ClearPass.
In addition, the Aruba ClearPass as a Radius proxy must be configured to send RADIUS accounting Start/Stop messages to the FortiGate as a RADIUS client. Such messages include the user roles configured using specific attributes such as filter-ID rules. For more info, refer to the following external links: ClearPass Integration with FortiGate ClearPass Adding a Network Device
On FortiGate, configure the following:
config user radius edit ClearPass set rsso enable set rsso-endpoint-attribute User-Name next end
At this point, RSSO users are listed under: Monitor -> Firewall User Monitor; however, it is possible to see all the users appear without User-Groups.
The RADIUS Attribute Value must exactly match the filter-id defined in ClearPass for the corresponding user role (with brackets and everything when necessary), otherwise the configuration will not work. At this stage, users must also be assigned to a User-Group in FortiGate user monitor.
('[User Authenticated] and [Device Authenticated]' or '[User Authenticated] and [IT]').
The RADIUS Attribute Value must be concatenated when the user meets both roles. To check the ClearPass attribute that is sent to the FortiGate, use the following command:
diagnose test application radiusd 3
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.