I am also not clear on exactly the desired setup, perhaps respond to this 
message with a goal rather than what you did.

As for fortigate SSO, you create Roles and use those roles in user policies on 
the ftg. Wouldn’t you want this anyways instead of making policies for 
individual users? You could always make a role for each individual user that 
needs to have a specific policy.

The setup is fairly straightforward using the RSSO external connector within 
security fabric, and a couple things on the command line/config. I can expand 
on this when I have time, if you are still interested.

For me, I created some specific groups and created corresponding RSSO groups on 
the FTG. I setup an LDAP authentication source and authentication rules to 
grant PF roles based on memberOf equals conditions. I found it useful to 
cascade the rules starting with higher privilege first, in case a user is a 
member of both high and low privilege groups.

This could be used for

The thing I don’t think people are understanding is your comment about VPN. If 
you are having users use the Forticlient anyways, and authenticating using 
LDAP, then you can develop far more user friendly and granular rules directly 
in fortigate. You can also splurge for their EMS product and get SSO over IPsec 
vpn and more metrics like group policy and antivirus enforcement. If you are 
using the VPN fortigate can do this natively. I just don’t understand why this 
VPN is part of the problem domain yet. Maybe if you elaborated we could help 
better.

--
Mark Amber
________________________________
From: Aaron Zuercher via PacketFence-users 
<packetfence-users@lists.sourceforge.net>
Sent: Tuesday, August 27, 2024 2:08:19 PM
To: packetfence-users@lists.sourceforge.net 
<packetfence-users@lists.sourceforge.net>
Cc: Aaron Zuercher <aaron.techge...@gmail.com>
Subject: Re: [PacketFence-users] Authentication PacketFence + Radius + FortiGate

Hello,
i'm not sure if I understand your design fully but I know Fortigate doesn't 
support Radius (RSSO) users in its profiles.    Here is a forum thread that 
explains the problem:

https://community.fortinet.com/t5/Support-Forum/Using-RSSO-usernames-in-policies/td-p/11235


I have put in a feature request with Fortigate to add this.  If this is 
affecting you I recommend contacting Fortinet to add support to this feature 
request.


Aaron



On Wed, Aug 21, 2024 at 2:41 PM Guilherme Assis via PacketFence-users 
<packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>>
 wrote:

Hello everyone.



Can you help me with a configuration?



I am working on a deployment that requires integrating my FortiGate Firewall 
with Packetfence RADIUS. The idea is to have clients connect to my Wi-Fi 
network through a Site-To-Site VPN to authenticate via Captive Portal and 
RADIUS return whether the user was authorized or not, thus freeing up the 
client's internet. However, I am having difficulties with this configuration. 
FortiGate has already managed to connect to RADIUS, but when I create a local 
user in Packetfence for testing, I am unsuccessful when trying to authenticate. 
For this configuration to be possible, do I need to synchronize the SSO 
Firewall? Today I have configured FortiGate in the Switches and SSO Firewall 
tabs.



Another question is how should I create the authentication source for this 
configuration to work.



I appreciate everyone's help!



Best regards,

[cid:ii_1919537b9a64ce8e91]



_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net<mailto:PacketFence-users@lists.sourceforge.net>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to