I want to create Fortigate policies that apply different web filtering to members of AD security groups, based on student grade levels. I have followed the Technical Tip: Configuring Radius Single Sign-On using NPS 2019. The students are able to connect to the wireless network, authenticate using 802.x, and placed in a specific VLAN. I'm struggling with passing the Network Policy's Class value (TestRSSO) from the NPS to the Fortigate. Where would this information show up when it's working, because I don't think it is.
Would FSSO be a better option for this?
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi CourtKPrin,
RSSO is perfectly fine. It supports logon, ip change and logoff.
Just needs to be set properly:
https://docs.fortinet.com/document/fortigate/6.2.12/cookbook/85730/radius-single-sign-on-rsso-agent
https://community.fortinet.com/t5/FortiAP/Technical-Tip-Radius-Single-Sign-On-RSSO/ta-p/191223
What is not often understood is that these parts:
set rsso-endpoint-attribute <attribute> set sso-attribute <attribute>
are a mapping instruction on FortiGate. In words:
FortiGate, you take the information of what user name this is (value) from this attribute (name).
FortiGate, you take the information of what group name this is (value) from this attribute (name).
You can freely specify what the user identifying attribute name should be and what the grouping attribute should be.
If unsure, create a packet capture on the FortiGate for port 1813 and see the accounting type start packets for the respective attribute names, that contain the username.
Best regards,
Markus
My co-workers started a ticket with Fortinet. Support is saying the two classes are concatenated. I'll ask them to verify that the Fortigate can handle the two class attributes and match against one of them.
Hey CourtKPrin,
in my previous update I mentioned FortiGate should be able to handle two instances of the Class attribute.
To elaborate on that - if the Class attribute appears twice with separate values, then the FortiGate can parse that and treat each separate value as one group name. In your case, with the group name and other information in the same Class attribute, I don't think that will quite work, Fortigate doesn't do a substring match (it's not just looking for the defined group name in the Class attribute, and ignores all other data in the same attribute, it's looking for an exact match).
Hi,
It is working now and the Fortigate parses multiple class attributes and matches the one I need. The settings on the Fortigate were correct all along. However, the Fortigate wasn't getting the Framed-IP-Address attribute from the accounting start messages and an IP is required by the Fortigate for RSSO to work. I now understand this is by design because the IP provided by DHCP isn't given until after authentication. The accounting interim-update messages provide the Framed-IP-Address attribute and IP value. For those using Mist, enable the "interim accounting" setting to send the appropriate accounting messages with the Framed-IP-Address.
I want to clarify that our third-party wifi is configured with the NPS's IP address for the radius and accounting servers. The NPS is then configured to forward accounting messages to the Fortigate.
I also want to clarify for those that come across this thread that the article linked to by Markus_M is a good one to follow. If you find other Fortigate articles that discuss adding a Radius Server and NPS client, it can be ignored if the clients are not authenticating through the Fortigate.
Thank you for sharing the details CourtKPrin :)
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1732 | |
1106 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.