This recipe walks you through integrating FortiAP using a WPA2-Enterprise WLAN encryption with 802.1X authentication using FortiAuthenticator against Google Workspace as the user database with Secure LDAP.
The customer uses Google Workspace user database to validate that a corporate user has a valid username and password and that they can authenticate to join the corporate network. FortiAuthenticator also provides dynamic VLAN here.
In this example, the user attempts to join the corporate WLAN; a WPA2-Enterprise WLAN, using FortiAuthenticator as a RADIUS server. FortiGate acts as an authenticator forwarding the request to FortiAuthenticator.
FortiAuthenticator is the authentication server and forwards the user request to a remote LDAP server. Here, Google Workspace using Secure LDAP.
If authentication succeeds, the user joins the corporate WLAN and receives attributes from FortiAuthenticator, such as a dynamic VLAN.
- Configuring FortiGate as a RADIUS client.
- Configuring Google Workspace as an LDAP server. See G Suite integration using LDAP.
- Creating a realm and RADIUS policy with EAP-TTLS authentication.
- Configuring FortiAuthenticator as a RADIUS server in FortiGate.
- Configuring a WPA2-Enterprise with FortiAuthenticator as the RADIUS server.
- Configuring Windows or macOS to use EAP-TTLS and PAP.