Description | This article describes the changes in LDAPS authentication behavior introduced in v7.4.4 & v.7.4.5. |
Scope | FortiGate v7.4.4 and above. |
Solution |
After upgrading to v7.4.4 and above, attempts to authenticate using LDAPS are unsuccessful. The issue can be confirmed by disabling 'Secure Connection' under User & Authentication -> LDAP Servers if it works after disabling this then it is LDAPS authentication making the problem. This issue can be also confirmed by running a packet sniffer for the LDAPS server's IP address and executing the debug commands mentioned below:
di de application fnbamd -1
To stop the debug, run the following commands:
diagnose debug disable diagnose debug reset
To start the sniffer, navigate to Network -> Diagnostics and select 'New Packet Capture'.
FortiOS 7.4.4 enhances the security standards for LDAPS by requiring that the server certificate be trusted by FortiOS during the TLS handshake. To comply with this requirement, CA certificate of the LDAP server must be imported into the FortiGate.
Import the CA certificate by following the steps outlined below:
To achieve a connection with server port 389: after upgrading to v7.4.4, disable certificate inspection on the LDAP server.
To export a CA certificate from the LDAP server, refer to the following documents for step-by-step instructions: Technical Tip: How to export root CA from Certificate Authority Server and import to FortiGate |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.