Documentation

 

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Introduction

Use this guide to configure the integration of Fortinet FortiGate Secure Web Gateway with SecureAuth IdP. 

 

...

Prerequisites

1. Fortinet FortiGate Secure Web Gateway (SWG) installed and configured.

...

4. In the Active Directory Domain Controller, use attribute editor to enter a value for the attribute ('"demo-admins' " in this case).

Note that this value will be used to create the User Group in Fortinet and names should match exactly.

...

SecureAuth IdP

...

configuration steps

SecureAuth IdP RADIUS

...

realm

1. On the Data tab of RADIUS Realmrealm, map an AD attribute to the AUX ID field.

...

2. On the API tab of the RADIUS Realm, ensure that you have selected Enabled User Management (must) and User and Group Association (optional).

RADIUS Server

...

configuration

3. On the RADIUS Admin interface, for the RADIUS client, map the IdP field to the appropriate AUX ID in the custom attribute mapping section:

...

5. Restart the RADIUS Server.

 

...

Fortinet FortiGate

...

configuration steps

Choose RADIUS Servers for

...

user and device

1. Click Create New to create a new RADIUS Server.

...

4. Click OK (see screenshot below).

Choose User Groups

...

for user and device

5. Click Create New to create a new User Group.

...

9. In the Groups field, enter a group name. This should match the value you created in step 4 of the Prerequisites section of this guide – in this example, '"demo-admins'".

The group name can be any text string of your choice. Any RADIUS user authenticating to FortiGate must have this same text string set in one of their user attributes – a mapping to this attribute is then created on the SecureAuth IdP and RADIUS Server(s).

...