| Description | This article describes how to resolve the error message 'Bad secret' in RADIUS authentication. |
| Scope | FortiGate, FortiProxy. |
| Solution |
The secret key in the RSSO agent configuration is case-sensitive, which means the secret key is treated differently depending on whether it is written with uppercase or lowercase text. The secret key must therefore be written on the RADIUS client exactly as it was configured on the FortiGate side:
config user radius edit "RSSO_Agent" set rsso enable set rsso-radius-response enable set rsso-validate-request-secret enable set rsso-secret <Secret Key> <----- set rsso-endpoint-attribute <RSSO attribute>
When the case sensitivity is not respected, FortiGate will not receive the radius accounting message and a 'Bad secret' error message is seen in the RADIUS debugging output as below:
FortiGate # diagnose debug disable FortiGate # diagnose debug enable FortiGate # diagnose debug application radiusd -1
FortiGate # 2025-10-28 12:40:49 Received radius accounting event
The following is an example of a secret key in FortiGate and NTRadPing. The secret key is enabled on NTRadPing as it is enabled on FortiGate:
config user radius
When case sensitivity is respected, FortiGate receives the RADIUS accounting message and the user is listed in the authenticated user list on FortiGate:
config user group
FortiGate # diagnose debug disable FortiGate # diagnose debug enable FortiGate # diagnose debug application radiusd -1 Debug messages will be on for 30 minutes. FortiGate # Received radius accounting event
FortiGate # diagnose firewall auth list 10.135.6.48, dilan
Related documents: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.