Skip to main content

FortiGate SSL VPN RADIUS integration

Multi-Factor Authentication (MFA) is an extra layer of security used when logging into websites or apps. Individuals are authenticated through more than one required security and validation procedure that only you know or have access to.

RADIUS is a protocol commonly used to authenticate, authorize, and account for user access and actions.

Acceptto offers a simple solution for adding MFA to FortiGate SSL VPN via its RADIUS solution.

Prerequisites

  • Acceptto RADIUS Agent that is configured and connected to your user directory. For example, Microsoft Active Directory (AD).

    For more information, see the Acceptto RADIUS deployment guide.

  • FortiGate UTM user account with administrative access

Acceptto RADIUS Agent configuration

To integrate Acceptto with your FortiGate UTM, you will need to install an Acceptto RADIUS Agent on a machine within your network. This server will receive RADIUS requests from your FortiGate UTM, check with the LDAP server to perform primary authentication, and then contact Acceptto cloud service for secondary authentication.

Follow these steps to configure the Acceptto RADIUS Agent.

  1. Log in to the Acceptto RADIUS Agent as an administrator.

  2. Open the radius-agent-config.env file with an editor.

    The file is located in the installed directory of RADIUS Agent. RADIUS clients are configured in this setting.

    Acceptto RADIUS agent
  3. At the end of the radius-agent-config.env file, set the following configuration for the ARA_CLIENTS attribute:

    The values should be separated by semicolons (;).

    ARA_CLIENTS = <An optional name for your FortiGate UTM>; <Internal IP address of your FortiGate UTM>; <a shared secret>

    For example, set:

    ARA_CLIENTS = FortiGate;192.168.1.50/32;testing12345
    ARA_CLIENTS configuration
  4. Save the file.

  5. Run the following command to apply the changes:

    docker-compose down && docker-compose up -d

FortiGate UTM configuration

In this section, you'll configure FortiGate as a service provider.

  1. Log in to your FortiGate UTM as an administrator.

  2. Go to User & Authentication > RADIUS Servers.

    Select RADIUS
  3. Click Create New, and enter your Acceptto RADIUS Agent information following the below image.

    Create new RADIUS
  4. Click OK.

  5. In the FortiGate console, change the authentication timeout to 60 seconds using the following commands:

    config system global
        set remoteauthtimeout 60
    end
  6. Go to User & Authentication > User Groups.

    User Groups
  7. Click Create New and set the following configurations:

    • Name – Set to a unique name.

      For example, Acceptto MFA.

    • Type – Set to Firewall.

    New user group
  8. Click Add to define a new Group Match.

  9. In the Add Group Match section, select Acceptto RADIUS.

    Add Group Match
  10. Click OK.

  11. Go to Policy & Object > Firewall Policy and edit the policy related to your SSL-VPN.

    Firewall policy
  12. Edit the Source field and add the User Group created in Step 7.

    Edit firewall policy
  13. Click OK to save the configuration.

  14. Go to VPN > SSL-VPN Settings.

    SSL-VPN settings
  15. In the Authentication/Portal Mapping section, click Create New.

  16. Set the following configurations:

    • User/Groups – Select the User Group created in Step 7.

    • Portal – Select the type of portal you are going to provide.

      The options are: full-access, tunnel access, or web access.

    New authentication mapping
  17. Click OK.

  18. Click Apply to save the configuration.

Test your application integration

  1. On the FortiClient VPN, create your SSL VPN connection and click Save.

    FortiClient VPN
  2. Enter your credentials and click Connect.

    You’ll receive a push notification on your Acceptto It’sMe mobile app.

    FortiGate RADIUS its me
  3. After approval, your connection will be established.

Support

If you have questions or need assistance, contact SecureAuth Support.

Sales

Want to learn more about our MFA solutions? Contact our Professional Services for a demo today.

Disclaimer

All product names, trademarks, and registered trademarks are the property of their respective owners.

All company, product, and service names used in this document are for identification purposes only. The use of these names, trademarks, and brands do not constitute an endorsement by the SecureAuth Corporation.