FortiSIEM
FortiSIEM provides Security Information and Event Management (SIEM) and User and Entity Behavior Analytics (UEBA)
mbenvenuti
Staff
Staff
Article Id 305116
Description This article describes how to troubleshoot LDAP authentication issues with FortiSIEM.
Scope FortiSIEM.
Solution

When setting up LDAP authentication or a user is not able to login with an invalid password, follow the steps below to check the credentials being used:

  1. Connect as root to the CLI of the FortiSIEM node (super or collector) doing the LDAP query.
  2. Run the next commands to activate debug logs:

cp /opt/phoenix/config/log4j2.xml /opt/phoenix/config/log4j2.xml.bak

 

sed -i 's/<Logger name=\"com.ph.phoenix\" level=\"info\" additivity=\"false\">/<Logger name=\"com.ph.phoenix\" level=\"debug\" additivity=\"false\">/' /opt/phoenix/config/log4j2.xml

 

tail -f /opt/glassfish/domains/domain1/logs/phoenix.log | egrep -i 'ldap|auth'

 

  1. In another CLI window, run the next command to take tcp packets (replace <ad_server_ip> by the IP of the LDAP server):

 

tcpdump host <ad_server_ip> -vvv -w /tmp/ldap_auth_test.pcap

 

  1. Run the test from the FortiSIEM from:
  • A portal for a user configured with external authentication
  • Admin -> Settings -> External Authentication -> Select profile -> Test.
  • Admin ->Credentials -> Step 2 -> Test credentials.

 

test_credential.png

 

  1. Stop the tail and tcpdump command with Ctrl + C.
  2. Check for explicit errors written in the logs.
  3. Retrieve the /tmp/ldap_auth_test.pcap file with WinSCP and open it with WireShark.
  4. Check the credential details from the Bind request:

LDAP_invalid_packets.PNG