OAuth policy configuration is available under Authentication > OAuth > Policies.
You can configure policies to be used in OAuth and OpenID Connect authentication to relying parties when the authorization grant type is Authorization code. See Relying Party.
To configure an OAuth policy:
- Go to Authentication > OAuth Service > Policies, and click Create New.
The OAuth Service wizard opens.
- Configure the OAuth policy:
Policy type Select the name and login portal. Name Enter a name for the policy. Description Optionally, provide a description of the policy. URL
The URL for the OAuth authorization. Authorization URLs use the following default format.
Select the portal to use with the policy. See Portals.
Identity sources Select the identity sources.
Select one of the following three username input formats:
Use default realm when user-provided realm is different from all configured realms
When enabled, FortiAuthenticator selects the default realm for authentication when the user-specified realm is different from all configured realms.
Add realms to which the client will be associated.
- Select a realm from the dropdown menu in the Realm column.
- Select whether or not to allow local users to override remote users for the selected realm.
- Edit the group filter as needed to filter users based on the groups they are in.
- If necessary, add more realms to the list.
- Select the realm that will be the default realm for this client.
Select the authentication factors.
Select one of the following:
- Mandatory password and OTP: Two-factor authentication is required for every user.
- All configured password and OTP factors: Two-factor authentication is required if it is enabled on the user's account, otherwise, allow one-factor authentication.
- Password-only: Authenticate users through password verification only. User accounts for which password authentication is disabled cannot be authenticated.
- OTP-only: Authenticate users through token verification only. User accounts for which token authentication is disabled cannot be authenticated.
Enable this option if you would like to have certain users bypass the OTP validation, so long as they belong to a trusted subnet.
Select All trusted subnets to add all the available trusted subnets.
You can specify the trusted subnets by selecting Specify trusted subnets. This opens a window where you can choose from a list of available trusted subnets.
Adaptive Authentication is available only for the following authentication types:
Mandatory password and OTP
All configured password and OTP factors
FIDO authentication (effective once a token has been registered)
Enable or disable FIDO authentication.
Select from the following two options:
FIDO token only: Log in with FIDO token only (without password).
Password and FIDO token: Log in with the password and the FIDO token.
Allow two-factor authentication (password and OTP) if all FIDO keys have been revoked for the user account
Enable to allow two-factor authentication (password and OTP) if all FIDO keys have been revoked for the user account.
Allow FortiToken Mobile push notifications
Toggle to enable or disable FortiToken Mobile push notifications for RADIUS users.
Application name for FTM push notification
Enter the client application name. This field is displayed on the FortiToken app.
When creating a new policy or upgrading to FortiAuthenticator 6.4, the policy name is the default client application name.
Resolve user geolocation from their IP address
Enable to resolve the user geolocation from their IP address (if possible).
Reject usernames containing uppercase letters
Enable this setting to reject usernames that contain uppercase letters.
- Select Save and exit to create the new policy.