| Description |
This article outlines a scenario where the FortiSIEM web interface or backend services fail to authenticate because the Apache password file /etc/httpd/accounts/passwds is blank or corrupted.
This issue prevents proper authentication between FortiSIEM components (e.g., Supervisor ↔ Worker or internal SVN access) and can lead to HTTP 401 (Unauthorized) errors, GUI login failures, or event forwarding interruptions. |
| Scope |
FortiSIEM v6.x, v7.x and later. Applies to Supervisors, Workers, and All-in-One nodes that rely on Apache for internal service authentication |
| Solution |
Check for Authentication Errors:
tail -f /var/log/httpd/ssl_error_log
Verify the Password File on All Cluster Nodes (Supervisor, Worker, Collector): Inspect the password file:
cat /etc/httpd/accounts/passwds
* If it is blank, the file was cleared or never populated.
Explanation:
The command displays the correct hash but does not automatically write it into the file. Manually Update the Password File: Make a backup and edit the file:
cp /etc/httpd/accounts/passwds /etc/httpd/accounts/passwds.bak
Paste the generated admin SHA line and save the file.
Verify: Monitor the access log for successful authentication:
tail -f /var/log/httpd/ssl_access_log
Expected output:
127.0.0.1 - admin "GET /svn HTTP/1.1" 200 - |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.