This section describes how to integrate FortiGate Remote Access Admin UI with RSA Cloud Authentication service using RADIUS.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service.
Procedure
- In the RSA Cloud authentication service section, go to RSA Cloud Tenant Admin GUI > Authentication Clients > RADIUS > Add RADIUS Clients and Profiles.
- Enter the IP address.
- Enter the Shared Secret.
- Disable the Message Authenticator attribute checkbox, as FortiGate doesn’t send authentication request with this attribute.
Note: Enter the rest of the configuration according to the required set up.
Configuration is complete.
Configure FortiGate Admin Access UI using RADIUS.
This section describes how to integrate FortiGate Remote Access Admin Access UI with RSA Authentication Manager using RADIUS.
Procedure
- Go to Admin UI of FortiGate > Users & Authentication > RADIUS Servers > New.
- Enter the IP of the RSA Authentication Manager or if you are using Cloud Authentication enter the RSA Identity Router Management IP and shared secret.
Note: You can enter up to three servers if you have replicas or 3 identity routers, the second server can be configured via GUI, the tertiary one must be configured from CLI only. To Configure a tertiary server, follow the following details.
-
- FEIRDUFG02 # config user radius
- FEIRDUFG02 (radius) # edit RSA-AM
- FEIRDUFG02 (RSA-AM) # set tertiary-server 10.65.65.50
- FEIRDUFG02 (RSA-AM) # set tertiary-secret support1!
- FEIRDUFG02 (RSA-AM) # end
- Go to User & Authentication and select User Groups to create a user group that aligns with the RADIUS server.
- In Remote Groups, click Add to create the corresponding RADIUS Server.
- Go to System > Administrators > Create New > Administrator.
- In the Username section, enter the name that match RSA ‘s Identity Source .
- In the Type, select either Match a User on Remote Server Group or Match on all Users on Remote Server Group
- In the Administrator profile section, select the required profile.
- In the Remote User Group section, select the previously configured group.
- Go to the FortiGate SSH and perform the below two commands to specify the time out and retries for the authentication.
- Ensure selecting the required VDOM), This timeout will be the Time in seconds between re-sending authentication requests.
Note: You can configure this setting based on your requirements. It represents the number of retries FortiGate sends to the RSA server. To account for potential packet loss and network issues, consider setting it to half the interval of the maximum waiting time, referred to as remoteauthtimeout in FortiGate. For details on the maximum waiting time, refer to the section below, following the two provided examples.
-
- FEIRDUFG02 # config user radius
- FEIRDUFG02 (radius) # edit RSA-On_Prem
- FEIRDUFG02 (RSA-On_Prem) # set timeout 15 or 30
Note: If you are using RSA Cloud Authentication Service as the RADIUS server:
-
- FEIRDUFG02 # config user radius
- FEIRDUFG02 (radius) # edit RSA_Cloud_IDR
- FEIRDUFG02 (RSA_Cloud_IDR) # set timeout 15 or 30
- FEIRDUFG02 (RSA_Cloud_IDR) # end
Note: The setting Maximum Waiting Time specifies the maximum duration the system will wait for a valid token code to be entered before closing the connection, regardless of whether the token code remains valid for a longer period. This timeout also impacts other authentication protocols, such as LDAP.
- If you are using RSA Authentication Manager with PIN-Approve or RSA Cloud Authentication Service with methods such as Biometrics/Approve, it can be set as 60.
- If you are only using OTP with any of them, without Biometrics/Approve then it can be set as 30.
- FEIRDUFG02 # config sys global
- FEIRDUFG02 (global) # set remoteauthtimeout60 or 30
- FEIRDUFG02 (global) # end
- Perform the following commands to return the Groups from RSA to perform Authorization.
Note: RSA may return a different profile. The following configuration outlines the setup required on the FortiGate side.
-
- FEIRDUFG02 # config sys admin
- FEIRDUFG02 (admin) # edit RSA_AM
- FEIRDUFG02 (RSA_AM) # set accprofile-override enable
- FEIRDUFG02 (RSA_AM) # end
- Go to Configuration from RSA Authentication Manager.
- Select RSA Security Console > RADIUS > RADIUS Profile > Add new.
- Add the Fortinet-Access-Profile attribute to return the needed access profile after successful authentications,
Note: (Optional) you can return a Fortinet-Group-Name, if the Fortinet Remote User Group requires it. Check the following configuration as an example. (Prerequisite: An existing RADIUS Model “Fortinet” must be in use by a RADIUS Client).
- Go to Configuration from RSA Cloud Authentication Service.
- Select Authentication Clients > RADIUS > FortiGate RADIUS Client > RADIUS Profile.
- Add the Fortinet-Access-Profile attribute to return the required access profile after successful authentications.
Note: (Optional) you can return the Fortinet-Group-Name, if Fortinet Remote User Group requires it. Check the following configuration as an example.
- Click Save and Publish.
Configuration is complete.
Return to the main page.
Related Articles
FortiGate Firewall - SAML My Page SSO Configuration Using Admin Access UI - RSA Ready Implementation Guide 54Number of Views FortiGate Firewall - Configure RADIUS Authentication Manager Using Admin Access UI - RSA Ready Implementation Guide 27Number of Views FortiGate Firewall - SAML IDR SSO Configuration Using SSL VPN - RSA Ready Implementation Guide 46Number of Views FortiGate Firewall - RSA Ready Implementation Guide 225Number of Views FortiNet FortiGate- RSA Ready Implementation Guide 23Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA MFA Agent 2.4 for Microsoft Windows Installation and Administration Guide Downloading RSA Authentication Manager license files or RSA Software token seed records Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Release Notes for RSA Authentication Manager 8.8