Fortinet black logo

Cookbook

Setting up a zero trust tunnel

Setting up a zero trust tunnel

A zero trust tunnel allows FortiAuthenticator to securely access TCP-based-on-premise services from the public internet. Further, using zero trust tunnels, you can access an on-premise LDAP/AD server.

In this example, FortiAuthenticator forms a zero trust tunnel to a remote ZTNA server, i.e., a FortiGate device.

To set up a zero trust tunnel:
  1. Configuring a zero trust tunnel on FortiAuthenticator
  2. Configuring an LDAP server with zero trust tunnel enabled on FortiAuthenticator
  3. Configuring certificate authentication for FortiAuthenticator
  4. Configuring a ZTNA server
  5. Configuring a ZTNA rule
  6. Debugging

Setting up a zero trust tunnel

A zero trust tunnel allows FortiAuthenticator to securely access TCP-based-on-premise services from the public internet. Further, using zero trust tunnels, you can access an on-premise LDAP/AD server.

In this example, FortiAuthenticator forms a zero trust tunnel to a remote ZTNA server, i.e., a FortiGate device.

To set up a zero trust tunnel:
  1. Configuring a zero trust tunnel on FortiAuthenticator
  2. Configuring an LDAP server with zero trust tunnel enabled on FortiAuthenticator
  3. Configuring certificate authentication for FortiAuthenticator
  4. Configuring a ZTNA server
  5. Configuring a ZTNA rule
  6. Debugging