Remote authentication for administrators
Administrators can use remote authentication, such as LDAP, RADIUS, and TACACS+ to connect to the FortiGate.
Local logins can also be restricted when remote authentication servers are available, see Restricting logins from local administrator accounts when remote servers are available.
Setting up remote authentication for administrators includes the following steps:
- Configuring the LDAP server
- Adding the LDAP server to a user group
- Configuring the administrator account
Configuring the LDAP server
To configure the LDAP server in the GUI:
- Go to User & Authentication > LDAP Servers and click Create New.
- Enter the server Name and Server IP/Name.
- Enter the Common Name Identifier and Distinguished Name.
- Set the Bind Type to Regular and enter the Username and Password.
- Click OK.
To configure the LDAP server in the CLI:
config user ldap edit <name> set server <server_ip> set cnid "cn" set dn "dc=XYZ,dc=fortinet,dc=COM" set type regular set username "cn=Administrator,dc=XYA, dc=COM" set password <password> next end
Adding the LDAP server to a user group
After configuring the LDAP server, create a user group that includes that LDAP server.
To create a user group in the GUI:
- Go to User & Authentication > User Groups and click Create New.
- Enter a Name for the group.
- In the Remote groups section, select Create New.
- Select the Remote Server from the dropdown list.
- Click OK.
To create a user group in the CLI:
config user group edit <name> set member <ldap_server_name> next end
Configuring the administrator account
After configuring the LDAP server and adding it to a user group, create a new administrator. For this administrator, instead of entering a password, use the new user group for authentication.
To create an administrator in the GUI:
- Go to System > Administrators and click Create New > Administrator.
- Specify the Username.
- Set Type to Match all users in a remote server group.
- In Remote User Group, select the user group you created.
- Select an Administrator Profile.
- Click OK.
To create an administrator in the CLI:
config system admin edit <name> set remote-auth enable set accprofile super_admin set wildcard enable set remote-group <ldap_group_name> next end
The Match all users in a remote server group option acts as a wildcard for matching any users against the remote server group. The Match a user on a remote server group option only matches the username defined to match against the remote server group, which is the equivalent of using |
Other methods of administrator authentication
Administrator accounts can use different methods for authentication, including RADIUS, TACACS+, and PKI.
RADIUS authentication for administrators
To use a RADIUS server to authenticate administrators, you must:
- Configure the FortiGate to access the RADIUS server.
- Create the RADIUS user group.
- Configure an administrator to authenticate with a RADIUS server.
TACACS+ authentication for administrators
To use a TACACS+ server to authenticate administrators, you must:
- Configure the FortiGate to access the TACACS+ server.
- Create a TACACS+ user group.
- Configure an administrator to authenticate with a TACACS+ server.
PKI certificate authentication for administrators
To use PKI authentication for an administrator, you must:
- Configure a PKI user.
- Create a PKI user group.
- Configure an administrator to authenticate with a PKI certificate.
Restricting logins from local administrator accounts when remote servers are available
Logins from local administrator accounts can be restricted when remote servers are available. When enabled, FortiOS will check if all of the remote servers used by administrators are down before allowing a local administrator to log in. This option is applied globally, and is disabled by default.
To restrict local administrator authentication when a remote authentication server available:
config system global set admin-restrict-local enable end