FortiPAM
FortiPAM allows you to protect, isolate and secure privileged account credentials, manage and control privileged user access, and monitor and record privileged account activity.
rbraha
Staff
Staff
Article Id 286165
Description

 

This article describes how to log in to FortiPAM using remote LDAP users with a token assigned in FortiAuthenticator.

 

Scope

 

FortiPAM, FortiAuthenticator.

 

Solution

 

  1. Add the FortiAuthenticator as RADIUS Server in FortiPAM under User Management -> RADIUS Server, select 'Create New', and specify the IP and secret that will be used also on the FortiAuthenticator side.

 

rad1.png

 

  1. Create a User Group, select Type as Remote, and specify a Group Name. This string attribute needs to be matched with the Group created on FortiAuthenticator.

 

rad2.png

 

  1. Create a standard user with the user type 'Remote User' and select 'Remote Group'. The group was created above.

 

kb_edit_02.06.PNG

  

  1. Specify group permission in the folder, and all users belonging to that group will have access to the secret of that folder.

 

kb_edit_04.06.PNG

 

kb_edit_03.06.PNG

 

Configuration that needs to be done on FortiAuthenticator:

It is presumed that FortiAuthenticator is integrated with the LDAP server and assigns a token to a remote LDAP user. Follow below admin guides:

LDAP

Remote users

 

  1. Create a new RADIUS group on FortiAuthenticator and add remote LDAP users part of this group, specify the RADIUS attribute with the same string value specified on the FortiPAM group.

 

rad6.png

 

  1. Create a RADIUS Policy on FortiAuthenticator for FortiPAM, on RADIUS attribute criteria and authentication type, leave it as default.

 

rad5.png

 

Test performed to log in FortiPAM with a user: 'pirlo', debug logs can be verified from FortiAuthenticator https://<fac-ip>/debug and select Radius-Authentication.

 

rad7.png

 

Note:

Wildcard remote Users are not supported for security reasons.