Hi FG admins
I thought at one point that it can be a good substitute to FSSO. I didn't try it yet but if I'm not misunderstanding the Kerberos authentication doesn't work in flow based mode. Can anyone explain why?
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi @AEK ,
Flow-based mode processes network traffic based on predefined rules without maintaining the state of individual connections. This means that packets are inspected and forwarded based on their attributes without considering the context of a particular session or connection.
Kerberos authentication relies on the exchange of tickets between clients and servers, which requires maintaining stateful communication between the two parties. In flow-based mode, this stateful communication can be challenging to maintain because packets are processed individually without regard to the ongoing authentication process.
As a result, flow-based mode may not be able to handle the intricacies of Kerberos authentication effectively, leading to authentication failures or security vulnerabilities. It's generally recommended to use proxy-based modes configuration to support Kerberos authentication effectively.
BR.
If my answer provided a solution for you, please mark the reply as solved it so that others can get it easily while searching for similar scenarios.
Thank you so much for the solution.
Thanks Atakan
This actually makes senss.
I thought at one point that it can be a good substitute to FSSO. I didn't try it yet but if I'm not misunderstanding the Kerberos authentication doesn't work in flow based mode. Can anyone explain post why it is?
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1698 | |
1092 | |
752 | |
446 | |
228 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.