Newbie here (sorry)!
I have searched through this site and could not find what I'm looking for, and hope you can help.
Background:
I have a FortiGate 1000D running firmware v5.2.11,build754 (GA) in a K-12 school district with 5,000 students with one-to-one devices. I also have a VM with FortiAuthenticator.
Issue:
I would like to configure my FortiGate to the following.
When a user logs into their device and opens up a web browser they are presented a login screen. Once they login and authenticate to my Active Directory, they are then allowed or denied access for a set time frame.
Thank you in advance for all your help!
Troy
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Haven't used them yet myself but in theory a captive portal should work. You can configure the LAN interface to use a captive portal based on authentication off a group you create that's tied to your AD server. More info here:
As for the time schedule, you'd have to configure that in your actual policy.
gsarica,
Thank you for the quick response, I will look into this.
Welcome to the forums.
The FSSO/FSAE software will authenticate the users behind the scenes without their manual intervention. If you enable NTLM authentication, the the browser window can pop up and allow the user to enter their credentials (I believe). IE automatically used NTLM (last time I checked many years back) and may not present the window either.
My two cents
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
The tricky part here is probably not the captive portal or FSSO but the time quota. Look at, for instance, Application Control with a quota (detect any application to trigger quota). Haven't had to solve this myself yet.
FSSO works like this: the FSSO software client will be installed on the DC and will supply the login status to the FGT. So there is no need to re-authenticate in a browser window, regardless of the browser used. Same for any other application, especially one which doesn't offer interactive input (e.g., ssh).
ede_pfau wrote:The tricky part here is probably not the captive portal or FSSO but the time quota. Look at, for instance, Application Control with a quota (detect any application to trigger quota). Haven't had to solve this myself yet.
FSSO works like this: the FSSO software client will be installed on the DC and will supply the login status to the FGT. So there is no need to re-authenticate in a browser window, regardless of the browser used. Same for any other application, especially one which doesn't offer interactive input (e.g., ssh).
I'm agree with you.
Time quota feature is needed to achieve this objective.
He speak about Students (thousands) and Active directory authentication, from my experience in this case students doesn't have a pc in domain, in this way the FSSO doesn't work because the first authentication of user are not logged to AD.
I think that correct match is, Captive portal on LAN interface and TimeQuota.
For captive protal he need to use LDAP server (the AD) like authentication source, and in the action column of security profile he have to use "Monitor" instead of "allow" so he can log info about sessions, duration and ecc.
Regards
Adrea
Hi All,
I am also looking for the same scenario, I want my users to authenticate behind the scenes prior to access internet. I configured captive portal but its always prompting the users to Open browser and connect. I configured Fortigate SSO with Microsoft Intune. I don't want users to enter their credentials. Passive authentication should happen when user is logged onto the system
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1705 | |
1093 | |
752 | |
446 | |
230 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.