FortiMail
FortiMail provides advanced, multi-layer protection against the full spectrum of email-borne threats
aaborehab
Staff
Staff
Article Id 253967
Description This article describes how to enable MFA for admin and webmail login using FortiMail and FortiAuthenticator (RADIUS). 
Scope FortiMail.
Solution

To enable MFA/OTP on FortiMail, it is necessary to have a RADIUS server integrated with FortiMail as an authentication server (in this example, FortiAuthenticator v6.4.6 is used):

 

  1. On FortiAuthenticator, adjust the radius policy for FortiMail to use password and OTP as follows: 

aaborehab_0-1682499607479.png

 

  1. Configure the method that the user will receive the OTP on FortiAuthenticator under the user's settings and allow the radius authentication:

aaborehab_1-1682499607484.png

 

 

  1. On FortiMail, it is necessary to create a RADIUS Auth profile as follows:

aaborehab_2-1682499607488.png

 

  1. To authenticate Webmail users, then the radius auth profile needs to be applied to the inbound recipient policy as follows:

 

aaborehab_3-1682499607494.png

 

  1. Then the token field will appear in the webmail login as follows:

 

aaborehab_4-1682499607495.png

 

  1. For the admin user, the admin needs to be created with the auth type RADIUS so the MFA can work:

 

aaborehab_5-1682499607496.png

 

 

In some cases, to allow sufficient time to complete multi-factor authentication, it is necessary to increase the timeout value from 5 seconds (default) to 60 seconds.

 

From the CLI:

 

config system global

    set remote-auth-timeout <timeout-factor_int>

end

 

Note:

The information above applies to FortiMail on-premises. For FortiMail Cloud tenants, multi-factor authentication (MFA) is supported only for webmail users; MFA for admin users is not supported in the new FortiMail Cloud tenants; however, it remains supported for admin access in legacy cloud instances.

  • New cloud: <hostname>.fortimailcloud.com
  • Legacy cloud: gwxxxxx.fortimail.com