FortiSIEM
FortiSIEM provides Security Information and Event Management (SIEM) and User and Entity Behavior Analytics (UEBA)
mbenvenuti
Staff
Staff
Article Id 306469
Description This article describes how to configure LDAP External Authentication.
Scope FortiSIEM.
Solution

When configuring User accounts on the FortiSIEM, there are several ways to import users from a Windows Active Directory.

  1. Users are stored in the CMDB by importing a discovery of all the users from the AD.
  2. Users are created on the fly at their first connection using the AD Group Role mapping feature.

 

Initial Steps:

  • If FortiSIEM is configured as Service Provider mode and LDAP needs to be configured on a dedicated organization, it is necessary to Install and configure a collector for that organization. See documentation on how to set Organization and collector in Service Provider mode.
  • It is necessary to identify/create a system account in AD that is possible to use for external authentication. This will help in next configuration steps.

 

In the Active Directory: 

Select the Domain, 'Right-click' -> Properties, and note the domain name.

 

Domain-name.png

 

Select the User, 'Right-click' -> Properties -> Member Of, and note the group names:

 

properties_domain_user.png

 

Select the User, 'Right-click' -> Properties -> Attribute editor, and note the name, sAMAccountName, userPrincipalName, and the distinguished name.

 

user-param-1.png

 

In the FortiSIEM:

As an admin user of the FortiSIEM or of a specific Organization, Configure LDAP credentials by going to Admin -> Setup -> Credentials -> New.

 

credentials.png

 

Associate it with the Active Directory IP.

 

associate-LDAP-IP.png

Test the credentials:

 

test-connectivity-LDAP.png

If the test credential is failing, review every entry involved in the access method definition. Regarding the NetBIOS/Domain field, make sure that it fits with the domain property found at the very first step of this article, or use one of the group type NetBIOS from the following command on the AD machine:

 

nbtstat -n

 

Configure the LDAP as External Authentication as a FortiSIEM admin or an Organization admin. From the organization admin user, set the domain name CMDB -> Users -> select user -> edit, and set the 'Domain' field to the expected domain of the organization.

 

add-domain-in-user.png

Go to Admin -> Settings -> External Authentication, configure external authentication, and set the directory where the users are in the 'base DN' field. 

 

ext-auth.png

 

Test the external authentication:

 

test-ext.png

 

  1. Import LDAP Users in the CMDB.
  • Discover the LDAP directory and go to Admin -> Setup -> Discovery -> New.

 

LDAP-discovery.png

 

  • Admin -> Setup -> Discovery, select an item, run discovery, and check the result and eventual errors at the 'Show Errors' tab.

 

LDAP-discovery-result.png

 

  • All the LDAP Users are imported into CMDB -> Users.
  • Go to CMDB -> Users -> Select a User that should log in to the FortiSIEM-> Edit.

 

edit-user-for-alias.png

 

  • Configure Alias on the User:

 

alias.png

 

  • Select System Admin and Edit, then configure the type of authentication and role:

 

edit-user-for-authType.png

 

  • Log in as the User at the portal.

 

  1. Create Users at first connection.
  • Go to Admin -> Settings -> Role -> AD Group Role -> New and fill in the AD Group and the role for those Users to be able to log in with a specific role.

 AD_Group_Role.png

 

  • It is possible now to connect with one of the Users in the configured group (example: 'domain users').

 

admin-test_login.png

 

  • The User account will be created in CMDB -> Users.

 

Important note:

The same steps can be used while setting up LDAPS external authentication. However, note that the SSL certificate check is performed regardless of whether the 'Check Certificate' option under the External Authentication Profile configuration is ticked.

This means that it is important to use the proper FQDN of the AD server in the IP/Host field that is set in the certificate to make it work.

 

Related articles: