- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Fortigate requiring token for internet access, even for users who should only use token with VPN.
This problem began after I upgraded Fortigate from 6.4.15 to 7.0.17 without any configuration changes. Before this, the issue was not observed. It's not a problem if it asks for a username and password; the issue is that it started asking for a token, which was initially required only for VPN users.
FortiGate is requiring a token for internet access, even for users who should only need a token only for VPN. The firewall integrates with MS AD with LDAP and FSSO.
VPN users authenticate with tokens via FortiAuthentication, also integrated with MS AD and LDAP. FortiGate requires a token for internet access only if users are in local, not when are in remote access.
All firewall rules for Internet access are configured to validate FSSO users, with LDAP validation as a fallback in the same rules. See the attached screenshot.
- Labels:
-
FortiAuthenticator
-
FortiGate
-
FortiToken
-
SSL-VPN
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
If you are using FSSO in firewall rules then it should not require token because it is passive authentication.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks for reply. You are right, but let me explain better. All firewall rules for Internet access are configured to validate FSSO users, with LDAP validation as a fallback in the same rules. See the attached screenshot.
Please feel free for comment, you're welcome.
Created on ‎02-11-2025 04:10 AM Edited on ‎02-11-2025 04:11 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Following @funkylicious post, what happens when you remove the LDAP group from your policy? Can you do the test and advise?
Created on ‎02-11-2025 04:40 AM Edited on ‎02-11-2025 04:48 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks @AEK again.
I haven't tried removing the LDAP group from the policy yet. This problem began after I upgraded Fortigate from 6.4.15 to 7.0.17 without any configuration changes. Before the upgrade, the issue was not observed. I'm trying to find an explanation for the problem before making any changes. It's not a problem if it asks for a username and password; the issue is that it started asking for a token, which was initially required only for VPN users.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The LDAP group configured in VPN is the same as the one configured in the firewall rule, right? I mean API-INTERNET-PERFIL-DEV_LDAP, right?
Then I'm not astonished that it asks for token if it is configured so in FortiAuthenticator. In that case I guess FOS 6.4.15 was dealing with this case (FSSO/LDAP group mix) differently than FOS 7.0.17 in terms of priority or just trying all possible authentications in parallel.
It is just an opinion (according to the behavior) but unfortunately I don't have any official document on that.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
@AEK , thank you again for your response. I have a hypothesis regarding our three authentication methods implemented:
1) FSSO for transparent authentication in AD.
2) LDAP (from the firewall to the AD server) that prompts for login and password if FSSO fails.
3) RADIUS from FortiAuthenticator (with LDAP to AD), intended solely for VPN.
Previously, the order seemed to be as listed above. However, after the firewall update, it appears the order changed to 1, 3, and 2. Do you share this impression?
I am unsure how to reconfigure the authentication priority to maintain the original sequence (1, 2, 3). I will look into this further.
If anybody knows, fill free to share.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Can you please run the following so I can understand more?
Start auth debug:
diagnose debug application fnbamd 255
diagnose debug enable
Run ldap auth test with the affected user:
diag test authserver ldap <AD_LDAP> <user> <password>
Run ldap auth test with the affected user:
diag test authserver radius <RADIUS_SERVER> <method> <user> <password>
Then generate the required traffic to trigger the firewall policy.
And share all the above output, each separately.
