Description | This article explains and demonstrates the configuration needed to authenticate an LDAP user using a custom Active Directory attribute instead of the standard username for SSL VPN access. |
Scope | FortiGate. |
Solution |
In this article, custom AD attribute employeeID will be used for SSL VPN authentication instead of username for demonstration.
Step 1 : Configure LDAP server
CLI:
config user ldap next
Step 2: Configure the User Group.
CLI:
config user group set member "Aquarium" config match edit 1 set server-name "Aquarium"
On the AD For user Test the employee ID set is '123456789'.
Step 3: Configure Firewall Policy.
CLI:
config firewall policy
Testing the connection for SSL using custom AD attribute, eg: employeeID instead of username
To check the SSL user connection, view SSL Monitor:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.