Solved! Go to Solution.
f the browser shows a hostname like Some.Authpage.com/FGTAUTH? then you match need to match the text.Adrian, I have changed the captive portal address via CLI to use an address which matches the wildcard cert *.xxx Then on the local DNS put an entry in for this to point to the interface IP. This should then work. When you say what is the exact error, the error is a certificate error.
f the browser shows a hostname like Some.Authpage.com/FGTAUTH? then you match need to match the text.Adrian, I have changed the captive portal address via CLI to use an address which matches the wildcard cert *.xxx Then on the local DNS put an entry in for this to point to the interface IP. This should then work. When you say what is the exact error, the error is a certificate error.
I am facing this issue, I have a COMODO CA public cert for authpage.mydomain.com and this dns points to Lan IP of fortigate. When i try to access https://google.com for the first time from an unauthenticated client, it redirects and throws a warning and i guess in google chrome it refuses to proceed.
One of the work around as i can understand is to use wildcard certificate for mydomain.com instead of authpage.mydomain.com. will this prevent the warning or it is not going to help?
any other workaround?
what if i want to force the user to a specific http site for the first time in the day , http sites go through the auth page without any warning. once the user is authenticated , he can go to any site.
Hi All,
I know this issue happened a while back. But I recently ran into the same thing and wanted to let you know how i resolved this.
1.You will first need to have a trusted SSL Certificate.
Gather this certificate and install it to the Fortigate.
System > Certificates > Upload Local and then CA Certificate.
2. added DNS entry to server that will point to the Fortigate and the SSL certificate install example disclaimer.mydomain.com
For a quick test to confirm the certificate is working properly you can change the admin-cert to the trusted cert you installed by going to. System > Administrators > Settings > Change Certificate to your specified Cert name.
Now on a pc local to the domain go to the dns entry you added. You should now be able to reach the firewall without getting an untrusted page.
The next steps you will be following are all inside the Fortigate.
3. Open up the CLI of the fortigate and run
config firewall policy
edit 9 (this number represents the policy ID you will be using to redirect users to a disclaimer for authentication)
set auth-redirect-addr disclaimer.mydomain.com
set auth-cert (your specified cert name)
end
**** If you have multiple policies setup for disclaimer I would recommend running those commands for each Policy ID****
4. Open up the GUI of the fortigate and browse to
User and Device > Authentication > Settings > Certificate (Your specified cert name)
You should now be complete. Test and you should see that your PC redirects to the address you had chosen and has the trusted certificate as well.
Hope this helps.
@NSGuru thanks for the explanation.
if you say Test at the end. how do you test? if you test with for example https://www.google.com do you then get it to work without certificate warnings?
NSGuruUser | Count |
---|---|
2034 | |
1161 | |
770 | |
448 | |
318 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.