Description | This article describes the changes in FortiGate's LDAPS/STARTTLS configuration starting from FortiOS v7.4.4. |
Scope | FortiGate FortiOS v7.4.4. |
Solution |
Starting from FortiOS v7.4.4, the LDAPS/STARTTLS server certificate issuer has been enforced. This means that the server certificate issuer (the root CA) needs to be installed on the FortiGate store, as it will otherwise cause an error in authentication.
fnbamd debug:
[433] start_remote_auth-Total 1 server(s) to try
The 'certificate verify failed' error appears when the root CA is not installed on the FortiGate store. To prevent this error, import the certificate (root CA) that signed the server certificate into the FortiGate store.
fnbadm debug:
[433] start_remote_auth-Total 1 server(s) to try
In this output, after the import, check the server certificate (Depth 0) and the root CA (Depth 1) that signed the server certificate. The error will go and LDAPS/STARTTLS authentications will start to work again.
On the LDAP configuration, there is nothing to be changed.
When using 'Secure Connection' with 'LDAPS' protocol On several occasions, it is charged a different CA than the one it should import. For example, a CA with a different common name than the one the LDAP Server is sending to FortiGate. The following image shows that the connection was not successful, because the 'CA_Cert_1' has a different common name than it should have.
To find out which Root-CA should be imported in this field, it is necessary to perform a PCAP capture with port 636, using the Network, Diagnostic GUI tool.
Once obtaining the capture, open it with WireShark, go to the 'TLSv.1.X Server Hello, Certificate, Server key Exchange' package
Note: There are times when, even after updating the server root certificate to the FortiGate certificate store, the authentication will fail due to an 'Unknown CA' error. In one case, the certificate was updated under the Local CA store instead of the Remote CA. After reinstalling the root certificate, when the certificate was under the Remote CA, the authentication was successful. As a result, make sure that the certificate is under the Remote CA in the certificate store. Additionally, ensure that the certificate is correctly downloaded as a CA from the authentication server. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.