Description | This article describes how to setup a FortiGate to authenticate and authorize the admin user using TACACS and fallback to local password. |
Scope | FortiGate. |
Solution |
Configure an admin user on the FortiGate. Set the type to 'Match a user on the remote server group' as this option would allow to set the local password.
Visit this article: Technical Tip: How to configure TACACS+ authentication and authorization in FortiGate to complete the TACACs+ related config for authentication and authorization. Admin account should be configured as below with the remote authentication and local backup password:
config system admin
Debug logs would show successful authentication when the TACACS+ server is up and running:
[579] fnbamd_tac_plus_validate_author_reply-arg cnt 3
Authenticating via local credentials can be restricted via global settings when servers are UP:
config system global
enable: Enable local admin authentication restriction.
Admin users can fallback to the local password when TACACS+ servers are completely down however unlike radius remote username would not work here and the locally configured username and password would have to be used (as per the test scenario in v7.4.x).
[517] __tac_plus_conn_timeout-Connction with FAC_TAC:10.5.24.70 timed out.
Logged in admin list:
krypton-kvm07 # get system info admin status |