Fortinet Firewall Integration with AuthPoint

Deployment Overview

This document describes how to set up multi-factor authentication (MFA) for your Fortinet Firewall with AuthPoint, and configure your Fortinet Firewall to integrate with AuthPoint RADIUS.

Your Fortinet Firewall must already be configured and deployed before you set up MFA with AuthPoint. Your Fortinet Firewall can be configured to support MFA in several modes. For this integration, we set up RADIUS authentication for the Fortinet Firewall.

This integration was tested with version 5.2.7 of Fortinet FortiGate 90D.

Fortinet 90D Authentication Data Flow with AuthPoint

AuthPoint communicates with various cloud-based services and service providers with the RADIUS protocol. This diagram shows the data flow of an MFA transaction for RADIUS.

Before You Begin

Before you begin these procedures, make sure that:

  • You have installed and configured the AuthPoint Gateway
  • End-users can log in to the Fortinet 90D Firewall
  • A token is assigned to a user in AuthPoint

Configure Fortinet 90D Firewall

Configure a RADIUS Server

To use RADIUS authentication with FortiGate Firewall VPN you must add a RADIUS server (the AuthPoint Gateway). The AuthPoint Gateway functions as a RADIUS server and must be installed somewhere on your network that has Internet access and that can connect to your RADIUS clients. For more information, see About Gateways.

  1. Log in to the FortiGate 90D web UI at https://<IP address of FortiGate 90D>.
  2. Select User & Device > Authentication > RADIUS Servers.

  1. Click Create New.
  2. In the Name text box, type a name for the RADIUS server. We suggest AuthPoint Gateway.
  3. In the Primary Server IP/Name text box, type the IP address of the AuthPoint Gateway (RADIUS server).
  4. In the Primary Server Secret text box, type a shared secret to identify your RADIUS client.
  5. Click OK.

Create a RADIUS User

Once you have added the AuthPoint Gateway RADIUS server, a user who will authenticate with this server must be defined.

  1. Select User & Device > User > User Definition.

  1. Click Create New.
  2. Select Remote RADIUS User. Click Next.

  1. In the User Name text box, type a user name for the user that will authenticate with the DMS RADIUS.
  2. From the RADIUS Server drop-down list, select the AuthPoint Gateway RADIUS server. Click Next.

  1. In the Email Address text box, type the email address for this user. Click Next.

  1. Select the Enable check box. Click Create.

You can create groups and assign users to them. For more information about groups and users please refer to Fortinet documentation.

SSL Settings

  1. Select VPN > Settings.
  2. Configure all settings in the Connection Settings section.

    Port 443 is used as the administration access port. If you connect to SSLVPN on port 443, you must change the administration access port.

  1. Configure all settings in the Tunnel Mode Client Settings section.

  1. Configure all settings in the Authentication/Portal Mapping section.

Create an SSL VPN Policy

You must create an SSL VPN policy to allow specific users and groups to use the SSL VPN.

  1. Select Policy & Objects > Policy > IPv4.
  2. Click Create New.
  3. From the Incoming Interface drop down list, select SSL VPN interface.
  4. From the Source Address drop down list, select all.
  5. From the Source User(s) drop down list, select the RADIUS user you created.
  6. From the Outgoing Interface drop down list, select the internal interface connected to the AuthPoint Gateway.
  7. From the Destination Address drop down list, select SLVPN_Tunnel_ADDR1.
  8. From the Schedule drop down list, select always.
  9. From the Service drop down list, select All.
  10. From the Action drop down list, select Accept.

  1. Other settings keeps default

  1. Add an HTTPS policy to allow the AuthPoint Gateway to communicate with AuthPoint Cloud through the firewall.

Configure AuthPoint

Before AuthPoint can receive authentication requests from Fortinet 90D, you must specify the Fortinet 90D Firewall client as a RADIUS resource in AuthPoint. You must also assign the Fortinet resource to the AuthPoint user group that will authenticate through Fortinet 90D.

Add a Fortinet 90D Resource in AuthPoint

From the AuthPoint management UI:

  1. From the navigation menu, select Resources.
  2. From the Choose a Resource Type drop-down list, select RADIUS. Click Add.

  1. Configure the settings for all options on the RADIUS page.

Add an Access Policy to AuthPoint

You must have at least one user group in AuthPoint for authentication with Fortinet 90D, and you must assign an access policy for the Fortinet 90D resource to that group. If you already have a group, you do not have to add another group.

In the AuthPoint management UI:

  1. Select Groups.
  2. To add a new group, click Add. If you already have a group that you want to use, click the Name of your group to edit it.

  1. In the Name text box, type a descriptive name for the group.
  2. (Optional) In the Description text box, type a description of the group.

  1. In the Access Policy section, click Add Policy.

  1. In the Add Policy dialog box, from the Resource drop-down list, select the resource you want to add an access policy for.
  2. (Optional) To require that users type their password before they authenticate for this resource, select the Require Password Authentication slider.
  3. Select which authentication options users in this group can choose from when they authenticate.

    For RADIUS resources, you can only choose OTP or push. RADIUS resources cannot use the QR code authentication option.

  1. Click Add.

  1. (Optional) Add one or more safe locations to your group. For more information about safe locations and detailed instructions to add them, see About Safe Locations.
  2. Click Save.

Before you can assign users to a group, you must add them to AuthPoint. You can either manually add user accounts, or import user accounts from your LDAP database. For more information about how to add user accounts, see Add User Accounts.

Bind the RADIUS Resource to a Gateway

To use RADIUS authentication with AuthPoint, you must have the AuthPoint Gateway installed on your corporate network and you must assign your RADIUS resources to the Gateway in the AuthPoint management UI. The Gateway functions as a RADIUS server. For more information, see About Gateways.

  1. From the navigation menu, select Gateway.
  2. Click the Name of your Gateway.
  3. In the RADIUS section, in the Port text box, type the port number used to communicate with the Gateway. The default ports are 1812 and 1645.
  4. From the Select a RADIUS resource text box, select your RADIUS client resource.
  5. Click Save.

Test the Integration

To test the integration of AuthPoint and the configuration of your Fortinet 90D Firewall, you can authenticate with a mobile token on your mobile device. For RADIUS resources, you can choose the one-time password (OTP) or push authentication methods.

In this example, we show the one-time password authentication method.

  1. Start Forticlient.
  2. Switch to Remote Access.
  3. On the SSL-VPN page, click Configure VPN.
  4. In the Connection Name text box, type the name of this connection.
  5. In the Description text box, type a description.
  6. In the Remote Gateway text box, type the IP address of the AuthPoint Gateway.
  7. Click Apply.
  8. Click Close.
  9. In the User Name text box, type your AuthPoint user name.
  10. In the Password text box, type your AuthPoint password and your OTP (the OTP for your token is shown in the AuthPoint mobile app). Do not add a space between your password and your OTP.
  11. Click Connect.

Give Us Feedback  ●   Get Support  ●   All Product Documentation  ●   Technical Search