Fortinet white logo
Fortinet white logo

What's new

What's new

The following list contains new and expanded features added in FortiPAM 1.8.0.

Secret/Launch

1128508- Customized resolution on Web RDP

Starting FortiPAM 1.8.0, a new Resolution option is available in the Launch Progress dialog when a secret is launched with the Web RDP launcher.

The new Resolution option allows you to customize the Web RDP session resolution.

1134577- RDP connection failure diagnosis tools to end users

Starting FortiPAM 1.8.0, a new Native RDP Diagnostics option is available when you open a secret.

Clicking the new Native RDP Diagnostics option displays diagnostic information for various scenarios:

  1. Successful launch

    Our diagnosis shows that your last native RDP connection started successfully at time 2025-08-14 11:06:09. If you're using rdp-security-leve \"TLS\" and you got blocked at the login screen of the remote server, likely that you didn't have the correct RDP credential filled in the secret.

  2. Failed launch due to incorrect Security Level of RDP

    Native RDP currently does not support rdp-security-level \"RDP\". Use \"TLS\" or \"Best-effort\" instead! Error code: 0x0068.\nAdditional information: N/A. \nLast launched at 2025-08-14 11:09:22\n

  3. Failed launch due to incorrect password with NLA

    NLA failed because server's response indicates there's an error in the challenge response. Did you have the correct credentials in the secret? Error code: 0x0140.\nAdditional information: N/A. \nLast launched at 2025-08-14 11:15:20\n

  4. Failed launch due to incorrect password with TLS

    Our diagnosis shows that your last native RDP connection started successfully at time 2025-08-14 11:06:09. If you're using rdp-security-leve \"TLS\" and you got blocked at the login screen of the remote server, likely that you didn't have the correct RDP credential filled in the secret.

  5. Failed launch due to incorrect domain with TLS

    Our diagnosis shows that your last native RDP connection started successfully at time 2025-08-14 11:06:09. If you're using rdp-security-leve \"TLS\" and you got blocked at the login screen of the remote server, likely that you didn't have the correct RDP credential filled in the secret.

  6. Failed launch due to network unreachable

    The RDP diagnosis information are empty (currently have info of secret 0, requested for 2). Please launch your native RDP again!"

  7. Failed launch due to target without RDP service

    No new diag created. Displays the last time of the diagnostics message.

1189926- Folder edit refactor

When editing a folder:

  • Secret policy is displayed when inherited.

  • Selecting a parent folder opens tree view similar to when editing a secret.

  • Previously available separate tab have been combined into a single page.

  • Permission removed from personal folders.

1171919, 1191816, 1164981- Secret edit page enhancements

In FortiPAM 1.8.0, when editing a secret from the secrets list in Secrets > Secrets:

  • New DLP Log and Antivirus Log tabs available in the Audit tab.

  • New Requests & Jobs tab available displaying references for requests/jobs.

  • Simplified services in the Settings page that displays only related services, e.g, for a secret that uses Web Account secret template, only the corresponding Web Service pane is displayed.

963330- Password expiry notification

Starting FortiPAM 1.8.0, you can manually set up the password expiry notification:

  1. When creating/editing a secret, a new Password Expiration Setting option is available in the Password Management pane in the Settings tab.

    When Password Expiration Setting is enabled, in Password Expires After x Days, enter the number of days after which the password expires.

    Once set up, the remaining password expiry time is displayed under Password Expiration Status on the left.

  2. In the Email Settings tab in System > Settings, a new Secret Password Expiration Notification field available.

    In Secret Password Expiration Notification, set how many days in advance to notify the user before their password expires.

    Note: This only works when Password Expiration Setting is enabled for a secret.

  3. A new password expiration secret event.

    Subscribers configured with a valid email address receive notification email when Password Expiration is selected in the Event Subscription tab when configuring a secret.

    Secret owners configured with a valid email address receive the password expiration notification.

  4. In the Password Event pane in Log & Report > Secret Event & Video, password expiring and expired logs are generated.

    A related email notification is sent out.

    Notes:

    1. For the password expiry notification to work, you must configure at least one or more direct secret owners with a valid email address.
    2. The notifications email does not apply to the configured direct owners in the secret owner group.
    3. Go to Log & Report > Email Alert Settings, and select Enable email notification.

      This is required to receive email notifications.

    4. This password expiration notification is mutually exclusive with Automatic Password Changing.

1178099- Support credential replacement for Siemens TIA Portal Cloud

Starting FortiPAM 1.8.0, FortiPAM now supports replacing credential for the Siemens TIA Portal Cloud.

When creating/editing a target in Secrets > Targets, a new Siemens-Tia option available in the Website Vendor dropdown.

1178353- Web API password changer enhancements

New enhancements for the customized Web API password changer:

  1. Supports CSRF token extraction from cookie using the following new configurations:
    1. extract-csrftoken: Enable/disable.
    2. csrf-key: Indicate the key to extract CSRF token in cookie.
    3. $CSRFTOKEN: Store the extracted CSRF token value.
  2. Supports multi-layer http JSON body parsing:
    • The http body may have multi-layer and contains the value that needs to be used in the post password change process.

    Example configurationExample

      edit x
       set type expect
       set expect-code 200
       set expect-str-in-body "\"retval\": 1"
       set token-location body #set location to body
       set extract-token enable #must be enabled
       set token-key "data.users.0.id"
      next
    

    Notes:

    • The token key string helps locate the user ID that may be used later.

    • The token value is stored into the variable $TOKEN.

    Variable

    Description

    data

    JSON object key value.

    users

    JSON object value array name.

    0

    Array object index.

    id

    Object key.

    http body response:

     {
      "result": {					
        "retval": 1,
        "message": null
      },
      "data": {
        "users": [
          {
            "id": 55,
            "name":"gavin",
            "is_auth_blocked": false,
            "last_seen": null,
            "comments": null,
            "password_Created_at": "2025-10-09T23:29:33.797"
         },
         {
            "id": 2,
            "name": "robert",
            "is_auth_blocked": false,
            "last_seen": null,
            "comments": "",
            "password_created_at": "2024-09-20T19:54:55.599"
        },
        {
           "id": 54,
           "name": "xiaojun",
           "is_auth_blocked": false,
           "last_seen": null,
           "comments": "",
           "password_created_at": "2025-10-09T23:29:33.797"
        }
       ],
       "total": 3
      }
     }

1180781- New password changer for FortiOS 7.6.3 or higher

Starting FortiPAM 1.8.0, a new SSH Password (FortiOS 7.6.3 and higher) password changer available to support a new change for FortiOS 7.6.3 and above.

1185540- SSH script new line mode setting

In FortiPAM 1.8.0, a new New Line Mode setting available when creating/editing a job entry in Secrets > Jobs.

Additionally, the New Job window has been refactored for improved user experience.

1186608- Powershell job support

Starting FortiPAM 1.8.0, FortiPAM supports the Powershell job type.

A new Powershell option is available in the Type dropdown when creating or editing a job in Secrets > Jobs.

1180921- Support multiple ZTNA tunnels: New Service Address field type

Starting FortiPAM 1.8.0, FortiPAM now supports a new field type called Service Address, which allows administrators to define one or more service access points (such as IP address ranges, FQDNs, or CIDR blocks) associated with a secret.

Each Service Address represents a network endpoint with an optional port or port range.

This is useful for secrets that connect to multiple network services or systems sharing similar credentials.

Each Service Address entry supports the following formats:

Format

Description

Example

<ip>[-<ip>]:<port>[<port>]

Single IP address or an IP address range with a specific port or port range.

192.168.10.1 - 192.168.10.5:22-25

<CIDR>:<port>[<port>]

Subnet with optional port range.

192.168.10.0/24:443

<FQDN>:<port>[<port>]

Fully Qualified Domain Name (FQDN) with optional port range.

example.com:8080 - 8085

<ip>[-<ip>]

IP address or IP address range only.

192.168.10.10 - 192.168.10.15

When defining a launcher supporting Service Address field, ensure that Start FortiClient Session in Multiprocess Mode is enabled.

Benefits:

  • The Service Address field type provides administrators with flexible, structured control over how network endpoints are defined within secrets.

  • It is ideal for environments where multiple service IP addresses or subnets share the same authentication credentials, while maintaining compatibility with OT-type launchers and manual target selection.

Restrictions and notes:
  • Mutual exclusivity-

    Templates containing Service Address cannot include other address-type fields such as Target Address, Domain, or URL.

  • Launcher compatibility-

    Templates with a Service Address field supports OT-Client launchers only.

  • Password verification/change-

    Secrets with Service Address fields do not support password verification or password changer features.

  • Target selection-

    When a template contains a Service Address field, auto-match creation for targets is disabled.

    Targets must be manually selected from those with Service Address settings.

  • Hidden settings-

    When using a Service Address field, unrelated settings such as Web Proxy or Domain/URL fields are hidden.

User/Group

1168964- Support Regular Expression match for a JWT user

Starting FortiPAM 1.8.0, FortiPAM now supports the following two match methods to authenticate a JWT user:

  • Exact Match

  • Regex Match

1179107- Concurrent secret launch limitation

The maximum number of secrets a user can launch simultaneously is restricted.

A new global setting Max Launched Sessions available in the Advanced pane in System > Settings.

Note: By default, applies to all users.

A new Max Launched Sessions setting in User Details when creating/editing a user.

Note: This setting is configured per user.

1192528- Auto provision email address and display name for SAML users

Starting FortiPAM 1.8.0, FortiPAM supports getting user display name and email address for auto provision SAML user when the two fields are configured in the remote SAML IdP and are included in the SAML response.

The following two new fields are available when editing an auto provisioned user SAML user:

  • Display Name

  • Email address

When configuring a SAML server, the following two new fields are available:

  • Attribute used to identify display name

  • Attribute used to identify email address

The following CLI command has been introduced:

 config user saml
  edit "fortipam-saml-sso-server"
   set email-attr "email" #email		
   set display-name-attr "disname" #display name
  next
 end

For every user, there is a new configuration supported to store the user display name for both local and remote users.

Once the user display name is configured, it shows on the top-right beside the username.

 config system admin
  edit "pam_saml"
   set remote-auth enable
   set accprofile "Default Administrator"
   set display-name "fortinet" #display name
   set force-saml-login enable
   set email-to "pam_saml@fortinet.com"
  next
 end

In the FortiPAM 1.8.0 GUI, Display Name and Email address are configured so as to match the attribute value in the SAML IdP.

FortiPAM auto provisions the SAML users from the remote IdP server with best effort.

Notes:

  1. When no display name or email address information synchronizes from the remote server, the administrator can edit those fields.
  2. After auto provisioned users are imported into FortiPAM and managed as local users, the display name and the email address field values stop synchronizing with the remote server.

1172128, 1228968- User SSO cache

Starting FortiPAM 1.8.0, FortiPAM now caches each user’s last-selected SSO provider.

On subsequent logins, the system automatically uses the previously chosen provider.

When launching a secret, the previously available SSO User option has been renamed to Authenticate using PAM login credentials.

1192051- New flag for SAML authentication: SAML assertion and response must be signed

Starting FortiPAM 1.8.0, a new require-signed-resp-and-asrt flag has been introduced for SAML authentication.

When the flag is enabled, FortiPAM expects both SAML assertion and response to be signed.

 config user saml
  edit x
   set require-signed-resp-and-asrt {enable | disable} #default = disable
  next
 end

System/Log

930125- FQDN setting for request email notification

Starting FortiPAM 1.8.0, a new Proxy FQDN field is available in the Advanced tab in System > Settings.

The new Proxy FQDN setting allows you to set up the FortiPAM FQDN used for email notifications.

1139972- New invitee list page

A new Invited Users tab in Monitoring.

You can now revoke invitation from an invitee.

A new Invitation tab in the Secret Events & Videos dropdown in the Logs tab in Log & Report > Secret Event & Video informing you about the status of an invitation.

1184826, 1191610- Concurrent logon licensing (VM only)

Starting FortiPAM 1.8.0, FortiPAM introduces a new type of FortiPAM Concurrent Logon License (FCLL, SKU-1303) to support concurrent logon sessions based on the purchased license seats.

  1. With FCLL, seats mean maximum concurrent logon sessions instead of the enabled user count.
  2. The number of enabled users can be up to 3000 (maximum user capacity in the system).
  3. Floating license in HA is applicable to FCLL.
  4. HA nodes must have the same FCLL license type, i.e., SKU-1303.
  5. When the active logon sessions hit the licensed concurrent logons, i.e., maximum concurrent logons allowed, any new login attempt is rejected with the following error message:

    Concurrent Logon Limit Reaced

    The concurrent logon limit has reached the limit allowed by license.

    Please try again later.

  6. In Dashboard, on the Virtual Machine widget, a new Concurrent License entry displays FCLL is being used.
  7. In Dashboard, on the Licenses widget, when you hover over Subscription License, the maximum licensed concurrent logons and the active concurrent logons are displayed.

988761- Auto-disabling for auto-provisioned remote users

Starting FortiPAM 1.8.0, auto-provisioned remote users can be automatically disabled due to prolonged inactivity.

This frees up user license seats by automatically disabling inactive accounts.

A new User Max Inactivity Days field available in the Other pane in Advanced tab in System > Settings.

When a user is disabled, a system log entry is generated.

You can view it in the Logs tab in Log & Report > System Event under User Events.

Setting the User Max Inactivity Days field to 0 disables the feature. Inactive users are not automatically disabled and remain in the system indefinitely.

1138886, 1180154- Limit users to log in to some interfaces

Starting FortiPAM 1.8.0, a new Allowed Access Portal Roles setting available when editing a network interface in Network > Interfaces.

From Allowed Access Portal Roles, you can select a role.

Only users whose role is selected are allowed to log in.

Alternatively, use the following new CLI command to only allow users with selected role to log in:

 config system interface 
  edit "port1"
   set gui-access-role <roles>
  next
 end

1133468- Support key-based SFTP authentication for remote video storage

Starting FortiPAM 1.8.0, a new Authentication Method dropdown is available in the Remote Video Storage tab in System > Backup.

From Authentication Method dropdown, choose the authentication method for the remote storage server:

  • Password: Password of the remote storage server as the login credential.

  • Keypair: Drag and drop/upload/paste the public/private key.

1195011- Support key- based SFTP authentication for auto-backup

Starting FortiPAM 1.8.0, a new Authentication Method dropdown is available in the Configuration Backup tab in System > Backup.

From Authentication Method dropdown, choose the authentication method for auto-backup:

  • Password: Password of the remote storage server as the login credential.

  • Keypair: Drag and drop/upload/paste the public/private key.

Note: The new Authentication Method setting is only available when Server Type is SFTP server.

1192909- Secret log enhancements

Starting FortiPAM 1.8.0, the following new secret log related enhancements have been introduced:

  1. For SSMS and OT type launchers (TIA Portal, TIA Portal V16 Logon, TIA Portal V19 Logon), a new Session Close Log setting is available when you open the launcher (Secret Settings > Launchers):
    1. Single: Only a single session close log is saved.

      Note: This is the legacy secret log behavior.

    2. Multiple: All the session close logs are saved.

      Note: All the connections during a session are recorded and available in the secret log table.

    Note: For all the other launchers, Session Close Log is Multiple.

  2. New Secret connection started secret log message.

    This new log message indicates when FortiPAM establishes connection to the target (Operation: Target connected, Message: Secret connection started).

  3. Corresponding to the Target connected operation, there is now a new Target disconnected operation.

    The Secret session ended log message has been renamed to Secret connection stopped.

  4. For Web Browsing, Web SFTP, Web SMB launchers, the log message is updated similar to 2 and 3 while keeping the legacy log.

1189656- System/secret logs pushed to Syslog server

After enabling/setting up Send logs to syslog in Log & Report > Log Settings, FortiPAM pushes the system and secret logs to the Syslog server, e.g., a FortiSIEM device.

Others

1203822- New FortiPAM 1100G hardware model

Starting FortiPAM 1.8.0, FortiPAM now supports a new FortiPAM 1100G hardware model.

For information on configuration capacity for the FortiPAM 1100G hardware model, Configuration capacity for FortiPAM hardware appliances and VM.

Note:

  1. When connecting with a FortiAnalyzer device, FortiAnalyzer 7.6.5 or higher is required.
  2. When connecting with EMS, EMS 7.4.1 or higher is required.

1189833- New FortiPAM 3100G hardware model

Starting FortiPAM 1.8.0, FortiPAM now supports a new FortiPAM 3100G hardware model.

For information on configuration capacity for the FortiPAM 3100G hardware model, see Configuration capacity for FortiPAM hardware appliances and VM.

Note:

  1. When connecting with a FortiAnalyzer device, FortiAnalyzer 7.6.5 or higher is required.
  2. When connecting with EMS, EMS 7.4.1 or higher is required.

1227940- FortiSRA consolidated into FortiPAM

In 1.8.0, FortiSRA has been consolidated into FortiPAM.

For information on migrating from FortiSRA to FortiPAM, see Migration from FortiSRA to FortiPAM.

Note:

Starting FortiPAM 1.8.0:

  1. The previous FortiSRA default administrator will have the full Super Administrator role, including the ability to launch secrets.
  2. With SKU-591, an extra seat is added for free.

    For example, when the purchased license seat quantity is 20, then 21 users can be enabled.

    For HA, if a node has 10 licensed seats and the other has 5 users, the primary node can have 16 users enabled.

1236701- FortiPAM on OCI

Starting 1.8.0, FortiPAM is compatible with Oracle Cloud Infrastructure (OCI), including:

  • Oracle Public Cloud (OPC)

  • Dedicated Region Cloud@Customer (DRCC)

Note:

  1. Log and video disk encryption is not supported.
  2. Virtual Trusted Platform Module (vTPM) is not supported.

What's new

What's new

The following list contains new and expanded features added in FortiPAM 1.8.0.

Secret/Launch

1128508- Customized resolution on Web RDP

Starting FortiPAM 1.8.0, a new Resolution option is available in the Launch Progress dialog when a secret is launched with the Web RDP launcher.

The new Resolution option allows you to customize the Web RDP session resolution.

1134577- RDP connection failure diagnosis tools to end users

Starting FortiPAM 1.8.0, a new Native RDP Diagnostics option is available when you open a secret.

Clicking the new Native RDP Diagnostics option displays diagnostic information for various scenarios:

  1. Successful launch

    Our diagnosis shows that your last native RDP connection started successfully at time 2025-08-14 11:06:09. If you're using rdp-security-leve \"TLS\" and you got blocked at the login screen of the remote server, likely that you didn't have the correct RDP credential filled in the secret.

  2. Failed launch due to incorrect Security Level of RDP

    Native RDP currently does not support rdp-security-level \"RDP\". Use \"TLS\" or \"Best-effort\" instead! Error code: 0x0068.\nAdditional information: N/A. \nLast launched at 2025-08-14 11:09:22\n

  3. Failed launch due to incorrect password with NLA

    NLA failed because server's response indicates there's an error in the challenge response. Did you have the correct credentials in the secret? Error code: 0x0140.\nAdditional information: N/A. \nLast launched at 2025-08-14 11:15:20\n

  4. Failed launch due to incorrect password with TLS

    Our diagnosis shows that your last native RDP connection started successfully at time 2025-08-14 11:06:09. If you're using rdp-security-leve \"TLS\" and you got blocked at the login screen of the remote server, likely that you didn't have the correct RDP credential filled in the secret.

  5. Failed launch due to incorrect domain with TLS

    Our diagnosis shows that your last native RDP connection started successfully at time 2025-08-14 11:06:09. If you're using rdp-security-leve \"TLS\" and you got blocked at the login screen of the remote server, likely that you didn't have the correct RDP credential filled in the secret.

  6. Failed launch due to network unreachable

    The RDP diagnosis information are empty (currently have info of secret 0, requested for 2). Please launch your native RDP again!"

  7. Failed launch due to target without RDP service

    No new diag created. Displays the last time of the diagnostics message.

1189926- Folder edit refactor

When editing a folder:

  • Secret policy is displayed when inherited.

  • Selecting a parent folder opens tree view similar to when editing a secret.

  • Previously available separate tab have been combined into a single page.

  • Permission removed from personal folders.

1171919, 1191816, 1164981- Secret edit page enhancements

In FortiPAM 1.8.0, when editing a secret from the secrets list in Secrets > Secrets:

  • New DLP Log and Antivirus Log tabs available in the Audit tab.

  • New Requests & Jobs tab available displaying references for requests/jobs.

  • Simplified services in the Settings page that displays only related services, e.g, for a secret that uses Web Account secret template, only the corresponding Web Service pane is displayed.

963330- Password expiry notification

Starting FortiPAM 1.8.0, you can manually set up the password expiry notification:

  1. When creating/editing a secret, a new Password Expiration Setting option is available in the Password Management pane in the Settings tab.

    When Password Expiration Setting is enabled, in Password Expires After x Days, enter the number of days after which the password expires.

    Once set up, the remaining password expiry time is displayed under Password Expiration Status on the left.

  2. In the Email Settings tab in System > Settings, a new Secret Password Expiration Notification field available.

    In Secret Password Expiration Notification, set how many days in advance to notify the user before their password expires.

    Note: This only works when Password Expiration Setting is enabled for a secret.

  3. A new password expiration secret event.

    Subscribers configured with a valid email address receive notification email when Password Expiration is selected in the Event Subscription tab when configuring a secret.

    Secret owners configured with a valid email address receive the password expiration notification.

  4. In the Password Event pane in Log & Report > Secret Event & Video, password expiring and expired logs are generated.

    A related email notification is sent out.

    Notes:

    1. For the password expiry notification to work, you must configure at least one or more direct secret owners with a valid email address.
    2. The notifications email does not apply to the configured direct owners in the secret owner group.
    3. Go to Log & Report > Email Alert Settings, and select Enable email notification.

      This is required to receive email notifications.

    4. This password expiration notification is mutually exclusive with Automatic Password Changing.

1178099- Support credential replacement for Siemens TIA Portal Cloud

Starting FortiPAM 1.8.0, FortiPAM now supports replacing credential for the Siemens TIA Portal Cloud.

When creating/editing a target in Secrets > Targets, a new Siemens-Tia option available in the Website Vendor dropdown.

1178353- Web API password changer enhancements

New enhancements for the customized Web API password changer:

  1. Supports CSRF token extraction from cookie using the following new configurations:
    1. extract-csrftoken: Enable/disable.
    2. csrf-key: Indicate the key to extract CSRF token in cookie.
    3. $CSRFTOKEN: Store the extracted CSRF token value.
  2. Supports multi-layer http JSON body parsing:
    • The http body may have multi-layer and contains the value that needs to be used in the post password change process.

    Example configurationExample

      edit x
       set type expect
       set expect-code 200
       set expect-str-in-body "\"retval\": 1"
       set token-location body #set location to body
       set extract-token enable #must be enabled
       set token-key "data.users.0.id"
      next
    

    Notes:

    • The token key string helps locate the user ID that may be used later.

    • The token value is stored into the variable $TOKEN.

    Variable

    Description

    data

    JSON object key value.

    users

    JSON object value array name.

    0

    Array object index.

    id

    Object key.

    http body response:

     {
      "result": {					
        "retval": 1,
        "message": null
      },
      "data": {
        "users": [
          {
            "id": 55,
            "name":"gavin",
            "is_auth_blocked": false,
            "last_seen": null,
            "comments": null,
            "password_Created_at": "2025-10-09T23:29:33.797"
         },
         {
            "id": 2,
            "name": "robert",
            "is_auth_blocked": false,
            "last_seen": null,
            "comments": "",
            "password_created_at": "2024-09-20T19:54:55.599"
        },
        {
           "id": 54,
           "name": "xiaojun",
           "is_auth_blocked": false,
           "last_seen": null,
           "comments": "",
           "password_created_at": "2025-10-09T23:29:33.797"
        }
       ],
       "total": 3
      }
     }

1180781- New password changer for FortiOS 7.6.3 or higher

Starting FortiPAM 1.8.0, a new SSH Password (FortiOS 7.6.3 and higher) password changer available to support a new change for FortiOS 7.6.3 and above.

1185540- SSH script new line mode setting

In FortiPAM 1.8.0, a new New Line Mode setting available when creating/editing a job entry in Secrets > Jobs.

Additionally, the New Job window has been refactored for improved user experience.

1186608- Powershell job support

Starting FortiPAM 1.8.0, FortiPAM supports the Powershell job type.

A new Powershell option is available in the Type dropdown when creating or editing a job in Secrets > Jobs.

1180921- Support multiple ZTNA tunnels: New Service Address field type

Starting FortiPAM 1.8.0, FortiPAM now supports a new field type called Service Address, which allows administrators to define one or more service access points (such as IP address ranges, FQDNs, or CIDR blocks) associated with a secret.

Each Service Address represents a network endpoint with an optional port or port range.

This is useful for secrets that connect to multiple network services or systems sharing similar credentials.

Each Service Address entry supports the following formats:

Format

Description

Example

<ip>[-<ip>]:<port>[<port>]

Single IP address or an IP address range with a specific port or port range.

192.168.10.1 - 192.168.10.5:22-25

<CIDR>:<port>[<port>]

Subnet with optional port range.

192.168.10.0/24:443

<FQDN>:<port>[<port>]

Fully Qualified Domain Name (FQDN) with optional port range.

example.com:8080 - 8085

<ip>[-<ip>]

IP address or IP address range only.

192.168.10.10 - 192.168.10.15

When defining a launcher supporting Service Address field, ensure that Start FortiClient Session in Multiprocess Mode is enabled.

Benefits:

  • The Service Address field type provides administrators with flexible, structured control over how network endpoints are defined within secrets.

  • It is ideal for environments where multiple service IP addresses or subnets share the same authentication credentials, while maintaining compatibility with OT-type launchers and manual target selection.

Restrictions and notes:
  • Mutual exclusivity-

    Templates containing Service Address cannot include other address-type fields such as Target Address, Domain, or URL.

  • Launcher compatibility-

    Templates with a Service Address field supports OT-Client launchers only.

  • Password verification/change-

    Secrets with Service Address fields do not support password verification or password changer features.

  • Target selection-

    When a template contains a Service Address field, auto-match creation for targets is disabled.

    Targets must be manually selected from those with Service Address settings.

  • Hidden settings-

    When using a Service Address field, unrelated settings such as Web Proxy or Domain/URL fields are hidden.

User/Group

1168964- Support Regular Expression match for a JWT user

Starting FortiPAM 1.8.0, FortiPAM now supports the following two match methods to authenticate a JWT user:

  • Exact Match

  • Regex Match

1179107- Concurrent secret launch limitation

The maximum number of secrets a user can launch simultaneously is restricted.

A new global setting Max Launched Sessions available in the Advanced pane in System > Settings.

Note: By default, applies to all users.

A new Max Launched Sessions setting in User Details when creating/editing a user.

Note: This setting is configured per user.

1192528- Auto provision email address and display name for SAML users

Starting FortiPAM 1.8.0, FortiPAM supports getting user display name and email address for auto provision SAML user when the two fields are configured in the remote SAML IdP and are included in the SAML response.

The following two new fields are available when editing an auto provisioned user SAML user:

  • Display Name

  • Email address

When configuring a SAML server, the following two new fields are available:

  • Attribute used to identify display name

  • Attribute used to identify email address

The following CLI command has been introduced:

 config user saml
  edit "fortipam-saml-sso-server"
   set email-attr "email" #email		
   set display-name-attr "disname" #display name
  next
 end

For every user, there is a new configuration supported to store the user display name for both local and remote users.

Once the user display name is configured, it shows on the top-right beside the username.

 config system admin
  edit "pam_saml"
   set remote-auth enable
   set accprofile "Default Administrator"
   set display-name "fortinet" #display name
   set force-saml-login enable
   set email-to "pam_saml@fortinet.com"
  next
 end

In the FortiPAM 1.8.0 GUI, Display Name and Email address are configured so as to match the attribute value in the SAML IdP.

FortiPAM auto provisions the SAML users from the remote IdP server with best effort.

Notes:

  1. When no display name or email address information synchronizes from the remote server, the administrator can edit those fields.
  2. After auto provisioned users are imported into FortiPAM and managed as local users, the display name and the email address field values stop synchronizing with the remote server.

1172128, 1228968- User SSO cache

Starting FortiPAM 1.8.0, FortiPAM now caches each user’s last-selected SSO provider.

On subsequent logins, the system automatically uses the previously chosen provider.

When launching a secret, the previously available SSO User option has been renamed to Authenticate using PAM login credentials.

1192051- New flag for SAML authentication: SAML assertion and response must be signed

Starting FortiPAM 1.8.0, a new require-signed-resp-and-asrt flag has been introduced for SAML authentication.

When the flag is enabled, FortiPAM expects both SAML assertion and response to be signed.

 config user saml
  edit x
   set require-signed-resp-and-asrt {enable | disable} #default = disable
  next
 end

System/Log

930125- FQDN setting for request email notification

Starting FortiPAM 1.8.0, a new Proxy FQDN field is available in the Advanced tab in System > Settings.

The new Proxy FQDN setting allows you to set up the FortiPAM FQDN used for email notifications.

1139972- New invitee list page

A new Invited Users tab in Monitoring.

You can now revoke invitation from an invitee.

A new Invitation tab in the Secret Events & Videos dropdown in the Logs tab in Log & Report > Secret Event & Video informing you about the status of an invitation.

1184826, 1191610- Concurrent logon licensing (VM only)

Starting FortiPAM 1.8.0, FortiPAM introduces a new type of FortiPAM Concurrent Logon License (FCLL, SKU-1303) to support concurrent logon sessions based on the purchased license seats.

  1. With FCLL, seats mean maximum concurrent logon sessions instead of the enabled user count.
  2. The number of enabled users can be up to 3000 (maximum user capacity in the system).
  3. Floating license in HA is applicable to FCLL.
  4. HA nodes must have the same FCLL license type, i.e., SKU-1303.
  5. When the active logon sessions hit the licensed concurrent logons, i.e., maximum concurrent logons allowed, any new login attempt is rejected with the following error message:

    Concurrent Logon Limit Reaced

    The concurrent logon limit has reached the limit allowed by license.

    Please try again later.

  6. In Dashboard, on the Virtual Machine widget, a new Concurrent License entry displays FCLL is being used.
  7. In Dashboard, on the Licenses widget, when you hover over Subscription License, the maximum licensed concurrent logons and the active concurrent logons are displayed.

988761- Auto-disabling for auto-provisioned remote users

Starting FortiPAM 1.8.0, auto-provisioned remote users can be automatically disabled due to prolonged inactivity.

This frees up user license seats by automatically disabling inactive accounts.

A new User Max Inactivity Days field available in the Other pane in Advanced tab in System > Settings.

When a user is disabled, a system log entry is generated.

You can view it in the Logs tab in Log & Report > System Event under User Events.

Setting the User Max Inactivity Days field to 0 disables the feature. Inactive users are not automatically disabled and remain in the system indefinitely.

1138886, 1180154- Limit users to log in to some interfaces

Starting FortiPAM 1.8.0, a new Allowed Access Portal Roles setting available when editing a network interface in Network > Interfaces.

From Allowed Access Portal Roles, you can select a role.

Only users whose role is selected are allowed to log in.

Alternatively, use the following new CLI command to only allow users with selected role to log in:

 config system interface 
  edit "port1"
   set gui-access-role <roles>
  next
 end

1133468- Support key-based SFTP authentication for remote video storage

Starting FortiPAM 1.8.0, a new Authentication Method dropdown is available in the Remote Video Storage tab in System > Backup.

From Authentication Method dropdown, choose the authentication method for the remote storage server:

  • Password: Password of the remote storage server as the login credential.

  • Keypair: Drag and drop/upload/paste the public/private key.

1195011- Support key- based SFTP authentication for auto-backup

Starting FortiPAM 1.8.0, a new Authentication Method dropdown is available in the Configuration Backup tab in System > Backup.

From Authentication Method dropdown, choose the authentication method for auto-backup:

  • Password: Password of the remote storage server as the login credential.

  • Keypair: Drag and drop/upload/paste the public/private key.

Note: The new Authentication Method setting is only available when Server Type is SFTP server.

1192909- Secret log enhancements

Starting FortiPAM 1.8.0, the following new secret log related enhancements have been introduced:

  1. For SSMS and OT type launchers (TIA Portal, TIA Portal V16 Logon, TIA Portal V19 Logon), a new Session Close Log setting is available when you open the launcher (Secret Settings > Launchers):
    1. Single: Only a single session close log is saved.

      Note: This is the legacy secret log behavior.

    2. Multiple: All the session close logs are saved.

      Note: All the connections during a session are recorded and available in the secret log table.

    Note: For all the other launchers, Session Close Log is Multiple.

  2. New Secret connection started secret log message.

    This new log message indicates when FortiPAM establishes connection to the target (Operation: Target connected, Message: Secret connection started).

  3. Corresponding to the Target connected operation, there is now a new Target disconnected operation.

    The Secret session ended log message has been renamed to Secret connection stopped.

  4. For Web Browsing, Web SFTP, Web SMB launchers, the log message is updated similar to 2 and 3 while keeping the legacy log.

1189656- System/secret logs pushed to Syslog server

After enabling/setting up Send logs to syslog in Log & Report > Log Settings, FortiPAM pushes the system and secret logs to the Syslog server, e.g., a FortiSIEM device.

Others

1203822- New FortiPAM 1100G hardware model

Starting FortiPAM 1.8.0, FortiPAM now supports a new FortiPAM 1100G hardware model.

For information on configuration capacity for the FortiPAM 1100G hardware model, Configuration capacity for FortiPAM hardware appliances and VM.

Note:

  1. When connecting with a FortiAnalyzer device, FortiAnalyzer 7.6.5 or higher is required.
  2. When connecting with EMS, EMS 7.4.1 or higher is required.

1189833- New FortiPAM 3100G hardware model

Starting FortiPAM 1.8.0, FortiPAM now supports a new FortiPAM 3100G hardware model.

For information on configuration capacity for the FortiPAM 3100G hardware model, see Configuration capacity for FortiPAM hardware appliances and VM.

Note:

  1. When connecting with a FortiAnalyzer device, FortiAnalyzer 7.6.5 or higher is required.
  2. When connecting with EMS, EMS 7.4.1 or higher is required.

1227940- FortiSRA consolidated into FortiPAM

In 1.8.0, FortiSRA has been consolidated into FortiPAM.

For information on migrating from FortiSRA to FortiPAM, see Migration from FortiSRA to FortiPAM.

Note:

Starting FortiPAM 1.8.0:

  1. The previous FortiSRA default administrator will have the full Super Administrator role, including the ability to launch secrets.
  2. With SKU-591, an extra seat is added for free.

    For example, when the purchased license seat quantity is 20, then 21 users can be enabled.

    For HA, if a node has 10 licensed seats and the other has 5 users, the primary node can have 16 users enabled.

1236701- FortiPAM on OCI

Starting 1.8.0, FortiPAM is compatible with Oracle Cloud Infrastructure (OCI), including:

  • Oracle Public Cloud (OPC)

  • Dedicated Region Cloud@Customer (DRCC)

Note:

  1. Log and video disk encryption is not supported.
  2. Virtual Trusted Platform Module (vTPM) is not supported.