Is it possible to authenticate the device along with the user when connecting to an SSL VPN using the free Forticlient VPN only app? Currently using Azure saml w/ MFA. We'd like to prevent users from trying to sign in with their personal devices.
Yes, it is possible to authenticate the device along with the user when connecting to an SSL VPN using the free Forticlient VPN only app. This can be achieved by enabling a feature called "Endpoint Control" in your FortiGate SSL VPN configuration.
With Endpoint Control enabled, the FortiGate VPN gateway will perform a device compliance check before allowing a user to connect to the VPN. This check can include verifying that the device has certain software installed, checking for the presence of security updates, and ensuring that the device meets other policy requirements.
To configure Endpoint Control, you will need to:
Enable Endpoint Control on your FortiGate SSL VPN gateway.
Define a compliance profile that specifies the requirements for devices connecting to the VPN.
Configure FortiClient VPN only app to connect to your SSL VPN gateway with Azure SAML authentication and MFA.
Test the configuration to ensure that only compliant devices can connect to the VPN.
By using Endpoint Control, you can prevent users from connecting to the VPN with unapproved or personal devices, helping to secure your network and data. último resultado de Astro luna
User Initiates VPN Connection: A user attempts to establish a VPN connection from their device (e.g., laptop, smartphone) to a remote network or server using SSL VPN.
Client-Side Certificate: During the initial connection attempt, the VPN client on the user's device presents a client-side certificate. This certificate is typically pre-installed on the user's device and is used for authentication.
Server Authentication: The SSL VPN server verifies the authenticity of the client-side certificate. This verification ensures that the certificate presented by the connecting device is legitimate and has not been tampered with.
Device Identity Check: The server checks if the certificate matches a list of trusted certificates or certificate authorities (CAs). If the certificate is trusted and valid, the server proceeds with the connection.
User Credentials: In addition to device authentication, the user may also be required to provide their username and password for further authentication. This dual authentication method (device and user) enhances security.
Secure Tunnel Establishment: Once the client-side certificate and user credentials (if required) are validated, a secure SSL VPN tunnel is established between the user's device and the VPN server.
Access Control: Access control policies are applied to determine what network resources and services the user/device can access within the VPN network. These policies are typically based on user roles, groups, or device types.
Encrypted Communication: All data transmitted between the user's device and the VPN server is encrypted, ensuring the confidentiality and integrity of the communication. Technology
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.