Fortinet white logo
Fortinet white logo

What's new

What's new

The following sections describe new features, enhancements, and changes in FortiProxy 7.6.2:

ZTNA agentless web-based application access

A ZTNA web portal is now available to provide end-user access to applications without FortiClient or client certificate checks. The ZTNA portal handles authentication and authorization of traffic destined for the protected resources. It is implemented entirely in WAD. When end-users connect to the ZTNA web portal, they are directed to a login page. Once logged in, end-users can access bookmarks defined by the administrator. Administrators can define dynamic bookmarks to generate personalized application shortcuts using an LDAP or SAML attribute within the user's LDAP or SAML account so that bookmarks are auto-populated with the values defined in that attribute instead of static pre-defined IP or hostnames.

See ZTNA agentless web-based application access in the Administration Guide for more details.

Authentication with OpenID Connect (OIDC)

FortiProxy 7.6.2 adds support for authentication with OpenID Connect (OIDC), a widely adopted JSON-based identity layer built on top of the OAuth 2.0 protocol. If you have an Identity Provider (IdP) like Azure AD, Google Identity, or any other service that supports OIDC, you can use it to authenticate users seamlessly across your FortiProxy instance and other integrated systems.

To configure OIDC, go to the User & Authentication > OIDC tab or use the config user oidc command.

Support switching to an alternate FortiSandbox if the main FortiSandbox is unavailable

FolrtiProxy 7.6.2 adds support for switching to an alternate FortiSandbox when the main FortiSandbox is unavailable. Once the connectivity is restored, it will automatically fall back to the primary FortiSandbox. You can configure an alternate FortiSandbox using the new Alt server option when configuring a FortiSandbox connector:

Alternatively, use the new alt-server option under config system fortisandbox. Use the new health-check-interval option to configure the interval of health check for the failover.

Log sample:

1: date=2025-01-09 time=07:15:56 eventtime=1736363756320902685 logid="0100022948"

type="event" subtype="system" level="warning" vd="root" logdesc="FSA failover status warning" name="sandbox" interface="undefined" probeproto="ping" msg="FortiSandbox changed

state from alive to dead, Peer:Primary status Primary:DOWN Alternate:DOWN protocol: ping."

Policy-based service connector traffic forwarding

FortiProxy 7.6.2 adds support for policy-based service connector traffic forwarding. In previous versions, the service connector must be configured within the traffic forward proxy, accessible only through ZTNA proxy.

To configure policy-based service connector traffic forwarding:

config firewall policy

edit 1

set service-connector "fpx166"

next

end

Change to HTTP header content maximum length

In FortiProxy 7.6.2, the HTTP header content maximum length is increased from 1023 to 4000.

New data type support for DLP and file filter

FortiProxy 7.6.2 adds support for .com, .jar, .jnlp, .css, and .dll files for DLP and file filter.

UEFI support for GCP

FortiProxy 7.6.2 adds UEFI support for GCP.

CLI changes

FortiProxy 7.6.2 includes the following CLI changes:

  • config firewall ssl-ssh-profile—The set client-certificate subcommand adds the new bypass-on-cert-req option to configure FortiProxy to bypass on certificate requests.

  • config system fortisandbox—Use the new alt-server option to configure an alternate FortiSandbox to be used when the main FortiSandbox is unavailable. Use the new health-check-interval option to configure the interval of health check for the failover.

  • config firewall policy—This command includes the following new options:

    • Use the new set service-connector option configure a policy-based service connector for traffic forwarding.

    • Use the new set https-sub-category option to enable or disable HTTPS sub-category policy matching. The default is disable.

  • config web-proxy global—The set policy-category-deep-inspect option is removed.

What's new

What's new

The following sections describe new features, enhancements, and changes in FortiProxy 7.6.2:

ZTNA agentless web-based application access

A ZTNA web portal is now available to provide end-user access to applications without FortiClient or client certificate checks. The ZTNA portal handles authentication and authorization of traffic destined for the protected resources. It is implemented entirely in WAD. When end-users connect to the ZTNA web portal, they are directed to a login page. Once logged in, end-users can access bookmarks defined by the administrator. Administrators can define dynamic bookmarks to generate personalized application shortcuts using an LDAP or SAML attribute within the user's LDAP or SAML account so that bookmarks are auto-populated with the values defined in that attribute instead of static pre-defined IP or hostnames.

See ZTNA agentless web-based application access in the Administration Guide for more details.

Authentication with OpenID Connect (OIDC)

FortiProxy 7.6.2 adds support for authentication with OpenID Connect (OIDC), a widely adopted JSON-based identity layer built on top of the OAuth 2.0 protocol. If you have an Identity Provider (IdP) like Azure AD, Google Identity, or any other service that supports OIDC, you can use it to authenticate users seamlessly across your FortiProxy instance and other integrated systems.

To configure OIDC, go to the User & Authentication > OIDC tab or use the config user oidc command.

Support switching to an alternate FortiSandbox if the main FortiSandbox is unavailable

FolrtiProxy 7.6.2 adds support for switching to an alternate FortiSandbox when the main FortiSandbox is unavailable. Once the connectivity is restored, it will automatically fall back to the primary FortiSandbox. You can configure an alternate FortiSandbox using the new Alt server option when configuring a FortiSandbox connector:

Alternatively, use the new alt-server option under config system fortisandbox. Use the new health-check-interval option to configure the interval of health check for the failover.

Log sample:

1: date=2025-01-09 time=07:15:56 eventtime=1736363756320902685 logid="0100022948"

type="event" subtype="system" level="warning" vd="root" logdesc="FSA failover status warning" name="sandbox" interface="undefined" probeproto="ping" msg="FortiSandbox changed

state from alive to dead, Peer:Primary status Primary:DOWN Alternate:DOWN protocol: ping."

Policy-based service connector traffic forwarding

FortiProxy 7.6.2 adds support for policy-based service connector traffic forwarding. In previous versions, the service connector must be configured within the traffic forward proxy, accessible only through ZTNA proxy.

To configure policy-based service connector traffic forwarding:

config firewall policy

edit 1

set service-connector "fpx166"

next

end

Change to HTTP header content maximum length

In FortiProxy 7.6.2, the HTTP header content maximum length is increased from 1023 to 4000.

New data type support for DLP and file filter

FortiProxy 7.6.2 adds support for .com, .jar, .jnlp, .css, and .dll files for DLP and file filter.

UEFI support for GCP

FortiProxy 7.6.2 adds UEFI support for GCP.

CLI changes

FortiProxy 7.6.2 includes the following CLI changes:

  • config firewall ssl-ssh-profile—The set client-certificate subcommand adds the new bypass-on-cert-req option to configure FortiProxy to bypass on certificate requests.

  • config system fortisandbox—Use the new alt-server option to configure an alternate FortiSandbox to be used when the main FortiSandbox is unavailable. Use the new health-check-interval option to configure the interval of health check for the failover.

  • config firewall policy—This command includes the following new options:

    • Use the new set service-connector option configure a policy-based service connector for traffic forwarding.

    • Use the new set https-sub-category option to enable or disable HTTPS sub-category policy matching. The default is disable.

  • config web-proxy global—The set policy-category-deep-inspect option is removed.