Fortinet white logo
Fortinet white logo

Perform additional configuration settings for FortiSOAR

Perform additional configuration settings for FortiSOAR

After running the FortiSOAR Configuration Wizard, you can enhance system security for production deployment based on your specific requirements. This includes tasks such as replacing the default self-signed certificates, configuring a network proxy, integrating FortiSOAR with authentication systems, and updating the FortiSOAR default database passwords.

Replace the self-signed certificates

FortiSOAR comes with default self-signed certificates for the web server, which are valid for two years from the time of FortiSOAR instance creation. For steps to regenerate these certificates, see the Regenerating Self-Signed certificates topic in the Monitoring & Optimization chapter in the "Best Practices Guide." For a production environment, it is strongly recommended to replace the default certificates with valid organization-signed certificates.

Set up network proxy

If your server accesses the internet and other intranet zones through a proxy, ensure that the proxy details are configured for the solution packs and connectors to establish the necessary outbound connections. This configuration is necessary to ensure that FortiSOAR can service all external requests. Additionally, ensure the following URLs are added to your organization's firewall or proxy server allowlist:

Integrate FortiSOAR with your organization's Authentication systems

You can integrate FortiSOAR with your organization's authentication systems to enable centralized and secure user access. Supported authentication methods include:

  • SSO (Single Sign-On): FortiSOAR supports SSO integration with various identity providers, including FortiAuthenticator (FAC), Google, Microsoft Entra ID (formerly Azure AD), Okta, and others.
  • LDAP: Enable LDAP or Active Directory authentication to allow user access through your organization's directory services. You can add users by mapping user attributes or by searching the directory and importing selected users.
  • Radius: FortiSOAR supports authentication via a RADIUS server. Users can log in using their RADIUS credentials.

Additional settings

You can also apply additional, recommended settings such as changing the system hostname and updating the FortiSOAR default database passwords, to align with your organization’s security and deployment standards.

Perform additional configuration settings for FortiSOAR

Perform additional configuration settings for FortiSOAR

After running the FortiSOAR Configuration Wizard, you can enhance system security for production deployment based on your specific requirements. This includes tasks such as replacing the default self-signed certificates, configuring a network proxy, integrating FortiSOAR with authentication systems, and updating the FortiSOAR default database passwords.

Replace the self-signed certificates

FortiSOAR comes with default self-signed certificates for the web server, which are valid for two years from the time of FortiSOAR instance creation. For steps to regenerate these certificates, see the Regenerating Self-Signed certificates topic in the Monitoring & Optimization chapter in the "Best Practices Guide." For a production environment, it is strongly recommended to replace the default certificates with valid organization-signed certificates.

Set up network proxy

If your server accesses the internet and other intranet zones through a proxy, ensure that the proxy details are configured for the solution packs and connectors to establish the necessary outbound connections. This configuration is necessary to ensure that FortiSOAR can service all external requests. Additionally, ensure the following URLs are added to your organization's firewall or proxy server allowlist:

Integrate FortiSOAR with your organization's Authentication systems

You can integrate FortiSOAR with your organization's authentication systems to enable centralized and secure user access. Supported authentication methods include:

  • SSO (Single Sign-On): FortiSOAR supports SSO integration with various identity providers, including FortiAuthenticator (FAC), Google, Microsoft Entra ID (formerly Azure AD), Okta, and others.
  • LDAP: Enable LDAP or Active Directory authentication to allow user access through your organization's directory services. You can add users by mapping user attributes or by searching the directory and importing selected users.
  • Radius: FortiSOAR supports authentication via a RADIUS server. Users can log in using their RADIUS credentials.

Additional settings

You can also apply additional, recommended settings such as changing the system hostname and updating the FortiSOAR default database passwords, to align with your organization’s security and deployment standards.