| Description | This article describes how to fix and troubleshoot the Winbind integration with FortiNAC. |
| Scope | FortiNAC v9.4 and Above |
| Solution |
fortinac:# execute enter-shell
The response with the domain controller IPs: Name: forti.lab
The 'dig' command can also be used to test name resolution. fortinac:~$ dig @<dns-server-ip> forti.lab In order to check whether DNS server is listening and reachable on port 53. fortinac:~$ nmap -p 53 <dns-server-ip> Additionally, ensure that _ldap._tcp.forti.lab and _kerberos._tcp.forti.lab SRV records can be resolved, as these are used by clients to locate domain controllers:
Note: If there is a network firewall or a firewall on a domain controller, ensure that above mentioned ports are allowed.
To check the NTP server configured in FortiNAC:
fortinac:# show system ntp config system ntp set ntpsync enable set ntpserver ntp1.fortiguard.com set syncinterval 60 end In the scenario below, the Domain Controller Hostname(s) was added as an Asterisk '*', and not as a username Domain Controller Hostname: Multiple servers may be specified, as well as * which will dynamically determine the best DC to contact.
Examples:
"dc01.example.com,dc02.example.com"
Or
"*" Navigate to Network -> RADIUS -> Winbind tab -> keep the service Disabled and select Create New.
Note: The Domain NetBIOS Name must be in upper case, written as 'FORTI'. The same applies to the Kerberos Realm Name.
gse_get_client_auth_token: gss_init_sec_context failed with [Unspecified GSS failure. Minor code may provide more information: Message stream modified](2529638953) To resolve the issue, run the following command on the domain controller FortiNAC is complaining about joining (in this case, it was the secondary domain dc2.forti.lab) to verify the SPN:
Example below:
Go to Windows -> Windows PowerShell on the Domain controller.
PS C:\Users\adminuser> setspn -L FORTI\adminuser A service principal name (SPN) is a unique service instance identifier. Kerberos authentication uses SPNs to associate a service instance with a service sign-in account. fortinac1:~$ cat /etc/samba/smb.conf Result: Related articles: Technical Tip: FortiNAC Domain join using account with minimum permissions Technical Tip: Create and use a Keytab file to join FortiNAC in the domain |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.