| Description | This article describes how to configure a Zero Trust Network Access (ZTNA) agentless web portal with multi-factor authentication (MFA). In this example, a FortiGate firewall is configured to authenticate users from the local user database using FortiToken as the MFA method. |
| Scope | FortiGate 7.6.1+. |
| Solution |
This guide provides a step-by-step procedure to configure a ZTNA agentless web portal secured with FortiToken-based MFA. The ZTNA agentless web portal enables users to securely access protected internal resources using only a standard web browser, without installing a ZTNA agent on the client device.
Step 1: Create a local user named 'localtoken', enable FortiToken as the second authentication factor, and add the user to a firewall user group named 'local-fgt-users'.
config user local
config user group
Step 2: Create a VIP of type access-proxy to handle incoming ZTNA agentless web portal connections on TCP/2587.
config firewall vip
Step 3: Define a virtual host that represents the FQDN ('ztna.fortilab.local') used to access the ZTNA web portal.
config firewall access-proxy-virtual-host
Note: It is recommended to use a trusted certificate matching the FQDN 'ztna.fortilab.local' instead of the default 'Fortinet_Factory' certificate.
Step 4: An authentication scheme with the method "form" is mandatory to support FortiToken MFA. The option "require-tfa" should also be enabled in order to include a token prompt in the firewall authentication login. Configure an authentication scheme and rule as in the example below:
config authentication scheme
config authentication rule
Step 5: Configure the ZTNA web portal using the previously configured VIP, virtual host, and authentication rule. To trigger the authentication portal, ensure that the 'auth-portal' option is enabled.
config ztna web-portal
Step 6: Define the bookmarks for internal resources, such as web servers, SSH, or RDP:
config ztna web-portal-bookmark edit "ssh" set apptype ssh next end
Step 7: Configure a proxy policy to allow access to the ZTNA web portal:
config firewall proxy-policy
Testing and validation:
Related articles: FortiOS 7.6.5 > ZTNA agentless web-based application access Technical Tip: How to configure ZTNA Session Based Authentication with MFA token |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.