| Description | This article describes the LDAP settings for correct User Group matching in case of Open LDAP integration. |
| Scope | FortiNAC-F. |
| Solution |
If FortiNAC-F does not match user group and user authentication is failing. For example, in the logs below, FortiNAC is unable to perform dox1x Authentication because it's unable to get the remote user from OpenLDAP.
yams.RadiusAccess.70:B5:E8:XX:XX:XX FINE :: 2025-08-26 14:51:28:786 :: #1145 :: 802.1x Auto Registration: true
yams.RadiusAccess.70:B5:E8:XX:XX:XX.RadiusAccessEngine FINE :: 2025-08-26 14:51:28:787 :: #1145 :: Get Legacy Isolate Action - Rogue Client on Forced Registration port
Solution: In LDAP settings for the OpenLDAP (under System -> Setting -> Authentication -> LDAP), apply the following values for Group attributes.
Select the user search and group search branches. Confirm the user DN is inside the selected user search branch, and the user is inside the selected group branch.
The configuration above can be verified against the OpenLDAP group settings by running the following command to check the group configurations in OpenLDAP.
ldapsearch -x -H ldap://localhost -b "dc=openldap,dc=lab" "(objectClass=posixgroup)"
If the configuration is correct, the OpenLDAP group will appear in the Select Groups tab.
Note: To use the 'OU' object class type, upgrade to FortiNAC-F v7.6.x. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.