The content you are looking for has been archived. View related content below.
Description | This article describes the changes in FortiGate's LDAPS/STARTTLS configuration starting from FortiOS v7.4.4. |
Scope | FortiGate v7.4.4 and above, v7.6.x. |
Solution |
Starting from FortiOS v7.4.4, the LDAPS/STARTTLS server certificate issuer has been enforced. This means that the server certificate issuer (the root CA) needs to be installed on the FortiGate store, as it will otherwise cause an error in authentication. Release note: FortiOS 7.4.4 Release Note (refer to Engineering case ID 949997).
fnbamd debug:
[433] start_remote_auth-Total 1 server(s) to try
The 'certificate verify failed' error appears when the root CA is not installed on the FortiGate store. To prevent this error, import the certificate (root CA) that signed the server certificate into the FortiGate store.
fnbadm debug:
[433] start_remote_auth-Total 1 server(s) to try
In this output, after the import, check the server certificate (Depth 0) and the root CA (Depth 1) that signed the server certificate. The error will go away, and LDAPS/STARTTLS authentications will start to work again.
On the LDAP configuration, there is nothing to be changed.
When using 'Secure Connection' with 'LDAPS' protocol On several occasions, it is charged a different CA than the one it should import. For example, a CA with a different common name than the one the LDAP Server is sending to FortiGate. The following image shows that the connection was not successful, because the 'CA_Cert_1' has a different common name than it should have.
To find out which Root-CA should be imported in this field, it is necessary to perform a PCAP capture with port 636, using the Network, Diagnostic GUI tool.
Once the capture is obtained, open it with WireShark, go to the 'TLSv.1.X Server Hello, Certificate, Server key Exchange' package, go to the TLS layer, and go to the Certificate/issuer option. In this part, it is possible to validate the Common Name that the server is sending to FortiGate.
Note: There are times when, even after updating the server root certificate to the FortiGate certificate store, the authentication will fail due to an 'Unknown CA' error. In one case, the certificate was updated under the Local CA store instead of the Remote CA. After reinstalling the root certificate, when the certificate was under the Remote CA, the authentication was successful. As a result, make sure that the certificate is under the Remote CA in the certificate store. Additionally, ensure that the certificate is correctly downloaded as a CA from the authentication server.
The same behavior is also observed in FortiOS v7.6.x.
Related article: Technical Tip: How to export root CA from Certificate Authority Server and import to FortiGate |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.