Hi,
I followed this article:
I created an AD group named “ssl-vpn” and assigned a user to it. When I create a group on the FortiGate and add the LDAP remote group, MFA is bypassed. The FortiGate only checks whether the user belongs to the AD group. I verified this by removing the user from the AD group after that, the user is no longer able to connect.
However, when I configure it exactly as described in the article, authentication is redirected to the FortiToken MFA. In this case, the FortiGate only checks that the user exists in AD, but it does not verify membership in the “ssl-vpn” AD group.
I tested this by removing the user from the “ssl-vpn” group in AD, and the user is still redirected to FortiToken MFA and is able to connect successfully.
What I am trying to achieve is the following flow:
First, verify that the user is a member of the “ssl-vpn” AD group.
Only if the user is a member of that group, proceed to MFA authentication.
Thanks in advance.
What is you ngfw version? Maybe upgrade to resolve unsolved issues.
Have you seen https://community.fortinet.com/t5/FortiGate/Technical-Tip-Description-of-CVE-2020-12812-bypassing-tw...
Have you tried ldap debug :
Hey the FW is running 7.2.12.
Created on 01-04-2026 12:52 PM Edited on 01-04-2026 01:56 PM
In FortiOS 7.2.12 Release Notes I see nothing about this but you can use a test VM NGFW 7.6.5 with the latest version and check if the issue is still there you can check the ldap debug that I mentioned and fortitoken debug ( FortiToken Basic Troubleshooting - Fortinet Community ) is still useful that I mentioned and checking the article about the issue even if it is for older versions as you use 2 local and remote groups that sounds like the article.
Everything I mentioned is when the Fortigate Talks with the FortiToken and there is no FortiAuthenticator that could have it's own issues or misconfigs.
Outside of that support could be the go to.
hi,
i think that importing the AD user locally on the FGT is the reason why it can log in w/o being part of the AD group.
the local group containing the user but doesnt specify/filter the remote LDAP server/group as per step 4 in your link so it doesnt do any checks for this.
i am unsure that you can achieve what you want importing users locally, but with FortiAuth i'm sure that this can be done.
| User | Count |
|---|---|
| 2895 | |
| 1448 | |
| 848 | |
| 825 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.