FortiMail
FortiMail provides advanced, multi-layer protection against the full spectrum of email-borne threats
contreraspa
Staff
Staff
Article Id 403665
Description This article describes how to override an administrator profile via RADIUS attributes when using a remote_wildcard admin account, using FortiAuthenticator as RADIUS Server
Scope FortiMail.
Solution

The 'remote_wildcard' is an administrator account in which it is possible configured to use authentication profiles for LDAP or RADIUS Servers, and all the accounts authenticated through this profile will be able to log in to the FortiMail as administrator.

By default, all the users authenticated through the RADIUS profile, will log in using the remote_wildcard account, and will have the same permissions (Admin Profile), but sometimes is needed to assign different permission levels, depending on user credentials. This can be achieved by enabling the option 'Enable remote access override' in the RADIUS Profile (Profile -> Authentication -> Radius):

 

RADIUS Server.png

 

In this case FortiMail is configured with the Admin Profiles adminprof1 and adminprof2 with different permission levels, to be assigned to different RADIUS users (raduser1 and raduser2:(

 

Admin Profiles.png

 

The RADIUS Server should be configured to send an attribute (FortiMail is expecting attribute ID=6, Fortinet-Access-Profile), with the name of Admin Profile to use.

In the FortiAuthenticator, add the RADIUS attribute accordingly to the Admin Profile required to each user:

 

FAC Users detail.png

 

When the users log in to the FortiMail each will be assigned the Admin Profile sent by the RADIUS Server, regardless the Admin Profile assigned to the remote_wilcard account:

 

raduser1 logged in.png

 

raduser2 logged in.png

 

If a RADIUS user doesn't have the RADIUS attribute configured or the attribute doesn't match any existing Admin Profile, it will use the Admin Profile assigned to remote_wildcard account.