Created on
03-09-2022
03:41 AM
Edited on
01-02-2026
03:41 AM
By
Jean-Philippe_P
| Description | This article describes when users are trying to go with SSL-VPN with MFA for RADIUS authentication, such issues are usually encountered. |
| Scope | FortiOS (all versions). |
| Solution |
When users attempt to connect to the SSL VPN FortiClient with two-factor authentication, specifically with Microsoft Azure, the following error shows up:
RSA NEW PIN IS WRONG -7201
To troubleshoot and narrow down this issue, follow these steps:
diagnose debug app sslvpn -1
[221:root:38e1]login_failed:388 user[syd0-NPS-test01],auth_type=1 failed [sslvpn_login_no_matching_policy]
It is likely to happen when the Radius Vendor Specific Attributes (VSA) being sent in the Radius access accept packet is not something the FortiGate understands, so it is recommended to correct that and make sure that the attribute is the same, such as the group name (it is case-sensitive).
FortiGate will look for RADIUS AVP Fortinet-Group-Name (and extract its value for group matching).
This is what the transaction will look like:
So, either every single user has their own AVP, or the user is a group member, and when authentication happens, then the user inherits AVP from the group.
Related articles: Technical Tip: Fortinet's RADIUS Dictionary (VSA - vendor-specific attributes), NTRadPing |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.