Created on
07-07-2022
11:36 PM
Edited on
03-03-2025
01:11 AM
By
Anthony_E
Description | This article describes how to configure FortiProxy for multidomain Kerberos authentication. |
Scope | FortiProxy. |
Solution |
Refer to this KB article to set Kerberos in FortiProxy:Technical Tip: Configuring FortiProxy Kerberos authentication for explicit proxy
There are several additional steps/data to be included:
C:\Users\Administrator>certutil -encode fpxkvm.keytab fpxkvm-base64
Open the encoded output using txt editor to retrieve the content.
For a multidomain, it is necessary to have 2 different LDAP servers. When setup an LDAP server object in FortiProxy, it is necessary to define 'group-search-base'(via CLI only).
Note: There has been a behavior change between v 7.2 and 7.0. If the 'group-search-base' is not configured in v7.0, the 'User membership query' in the LDAP query could still work and group information could be retrieved with this method.
But after v7.2, if this option is not configured, FortiGate will not do any 'User membership query' but only ‘attribute query’ and 'Primary group query'. For those LDAP groups that require a 'User membership query', they will be missing in the LDAP response. It is important to define the 'group-search-base'.
config user ldap
Create a Kerberos object in FortiProxy. Include both LDAP servers in the Kerberos setting.
For the user group, make sure the user group is associated with the same LDAP server.
The policy:
Result:
ID: 46, VDOM: root, IPv4: 10.207.1.46
Forward traffic log:
date=2022-07-08 time=13:48:11 eventtime=1657259291692334330 tz="+0800" logid="0000000010" type="traffic" subtype="forward" level="notice" vd="root" srcip=10.207.1.46 srcport=56025 srcintf="port4" srcintfrole="undefined" dstcountry="Malaysia" srccountry="Reserved" dstip=23.14.198.78 dstport=80 dstintf="port1" dstintfrole="undefined" sessionid=1604885030 service="HTTP" wanoptapptype="web-proxy" proto=6 action="accept" policyid=3 policytype="proxy-policy" poluuid="6492abee-fdd7-51ec-6427-0c5f05701d8f" policyname="Kerb" trandisp="snat" transip=10.47.2.28 transport=40650 duration=5115 user="testbezza" group="Kerberos-Bezza-user-group" authserver="Kerberos-LDAP-Bezza" wanin=338 rcvdbyte=338 wanout=213 lanin=4869 sentbyte=4869 lanout=5763 appcat="unscanned"
date=2022-07-08 time=13:47:44 eventtime=1657259264303615072 tz="+0800" logid="0000000010" type="traffic" subtype="forward" level="notice" vd="root" srcip=10.207.1.46 srcport=55969 srcintf="port4" srcintfrole="undefined" dstcountry="United States" srccountry="Reserved" dstip=13.107.42.254 dstport=443 dstintf="port1" dstintfrole="undefined" sessionid=1604885023 service="HTTPS" wanoptapptype="web-proxy" proto=6 action="accept" policyid=3 policytype="proxy-policy" poluuid="6492abee-fdd7-51ec-6427-0c5f05701d8f" policyname="Kerb" trandisp="snat" transip=10.47.2.28 transport=60194 duration=14098 user="testkancil" group="Kerberos-Kancil-user-group" authserver="Kerberos-LDAP-Kancil" wanin=7499 rcvdbyte=7499 wanout=1199 lanin=4328 sentbyte=4328 lanout=12494 appcat="unscanned"
Other things to take note:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.