| Description | This article provides the minimum required firmware versions for successful multifactor authentication using FortiClient manual code entry or FortiToken mobile push when connecting to a FortiGate IKEv2 Dialup IPsec gateway. |
| Scope | FortiGate IKEv2 IPsec, FortiAuthenticator, FortiClient, FortiToken Mobile, FortiIdentity Cloud. |
| Solution |
FortiGate triggering MFA prompts for IKEv2 Dialup Gateway clients relies on proprietary EAP extensions. It is only supported when FortiClient is used. Exact firmware and software requirements depend on the authentication method.
SAML: There are no significant FortiToken-specific considerations when integrating SAML with FortiGate IKEv2 IPsec dialup gateways. Support depends on whether the devices involved support SAML authentication with IKEv2 IPsec.
Minimum versions to use SAML authentication with IPsec:
External browser support differs; see Technical Tip: FortiGate IPSec Dial-up IKEv2 SAML-based authentication with FortiAuthenticator as Id....
EAP-MSCHAPv2: FortiClient manual code entry minimum versions:
FortiToken Mobile push minimum versions (manual code entry fails):
In the firmware versions above, when FortiToken mobile push is configured, manual code entry fails. This is a known issue patched in the following versions.
Note: FortiIdentity Cloud push and FortiToken mobile push for IPsec tunnels hosted in a non-root VDOM have a known issue (ID# 1153984) that causes the push to fail, resolved in FortiOS v7.4.9 and v7.6.1.
EAP-TTLS: Minimum Required Version:
EAP-TTLS 2FA support is limited to use cases where FortiToken Mobile or FortiIdentity Cloud two-factor authentication is assigned to locally configured users on FortiGate. These users may be configured to authenticate using a local credential or using remote LDAP or RADIUS servers.
FortiAuthenticator does not support MFA for FortiClient using EAP-TTLS. However, appending the OTP code to the password can be used as a workaround, see Technical Tip: How to resolve the 'EAP authentication failed due to missing token' error when using ....
Third-party MFA: Fortinet uses a proprietary EAP extension to trigger the token code prompt for connecting FortiClients. Manual OTP code entry or FortiToken mobile push for other VPN clients is not supported.
When integrating third-party MFA solutions using FortiAuthenticator as a RADIUS proxy, EAP-MSCHAPv2 is recommended. The minimum required firmware versions are the same as for the EAP-MSCHAPv2 manual code prompt.
If not using FortiGate or FortiAuthenticator to trigger MFA, the FortiClient OTP code prompt is not supported. Third-party MFA solutions that do not rely on a token code prompt, such as Duo push or Microsoft Entra multifactor authentication, may function normally depending on the relevant authentication timeouts configured on FortiGate.
config system global set remoteauthtimeout <seconds> end
config user radius edit <server name> set timeout <seconds> next end
FortiOS does not support extending the remote LDAP server timeout for IKEv2 EAP authentication.
Related article: Technical Tip: Multi-Factor Authentication support for Windows FortiClient with LDAP (EAP-TTLS) |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.