Fortinet Document Library

Version:


Table of Contents

Deploying FortiAuthenticator on Azure

About FortiAuthenticator for Azure

6.2.0
Download PDF
Copy Link

Connecting to FortiAuthenticator

To connect to the FortiAuthenticator-VM, you require the public IP address of the virtual machine, and administrator credentials set when creating the FortiAuthenticator-VM.

Locate the FortiAuthenticator-VM public IP address:
  1. From the Microsoft Azure Portal, click Virtual machines.
  2. Locate and select your FortiAuthenticator-VM from the list of the virtual machines.
  3. Take note of the public IP address of the virtual machine.

    You can also obtain the public IP through the Azure CLI using the CLI command: az vm list-ip-addresses -g <RESOURCE GROUP> -n <VM NAME>
    For example:

    {contoso}5279: az vm list-ip-addresses -g CTSOFACRG -n "CTSOFACVM" 
    --output yaml
    - virtualMachine:
         name: CTSOFACVM
         network:
           privateIpAddresses:
           - 172.16.208.4
           publicIpAddresses:
           - id: 
    /subscriptions/2d36c33d-fcb2-4634-bc26-65bb54358e0c/resourceGroups/CTSOFACRG/providers/Microsoft.Network/publicIPAddresses/CTSOFACVM-ip
             ipAddress: 23.97.203.47  <-- Public IP Address
             ipAllocationMethod: Dynamic
             name: CTSOFACVM-ip
             resourceGroup: CTSOFACRG
         resourceGroup: CTSOFACRG
Connect to the FortiAuthenticator UI:
  1. In a web browser, navigate to https://<public_IP>.
  2. When you connect, your web browser might display a security warning related to the certificated not being trusted. This warning is normal and is due to the certificate being self-signed, rather than being signed by a valid certificate authority. Verify and accept the certificate, either permanently or temporarily, and proceed to https://<public_IP>.
  3. On the Login page, enter the username and password you set when you creating the FortiAuthenticator-VM.
  4. Click Login.
    The FortiAuthenticator Dashboard displays.

Connecting to FortiAuthenticator

To connect to the FortiAuthenticator-VM, you require the public IP address of the virtual machine, and administrator credentials set when creating the FortiAuthenticator-VM.

Locate the FortiAuthenticator-VM public IP address:
  1. From the Microsoft Azure Portal, click Virtual machines.
  2. Locate and select your FortiAuthenticator-VM from the list of the virtual machines.
  3. Take note of the public IP address of the virtual machine.

    You can also obtain the public IP through the Azure CLI using the CLI command: az vm list-ip-addresses -g <RESOURCE GROUP> -n <VM NAME>
    For example:

    {contoso}5279: az vm list-ip-addresses -g CTSOFACRG -n "CTSOFACVM" 
    --output yaml
    - virtualMachine:
         name: CTSOFACVM
         network:
           privateIpAddresses:
           - 172.16.208.4
           publicIpAddresses:
           - id: 
    /subscriptions/2d36c33d-fcb2-4634-bc26-65bb54358e0c/resourceGroups/CTSOFACRG/providers/Microsoft.Network/publicIPAddresses/CTSOFACVM-ip
             ipAddress: 23.97.203.47  <-- Public IP Address
             ipAllocationMethod: Dynamic
             name: CTSOFACVM-ip
             resourceGroup: CTSOFACRG
         resourceGroup: CTSOFACRG
Connect to the FortiAuthenticator UI:
  1. In a web browser, navigate to https://<public_IP>.
  2. When you connect, your web browser might display a security warning related to the certificated not being trusted. This warning is normal and is due to the certificate being self-signed, rather than being signed by a valid certificate authority. Verify and accept the certificate, either permanently or temporarily, and proceed to https://<public_IP>.
  3. On the Login page, enter the username and password you set when you creating the FortiAuthenticator-VM.
  4. Click Login.
    The FortiAuthenticator Dashboard displays.