Authentication > RADIUS service

RADIUS service

Before the FortiAuthenticator unit can accept RADIUS authentication requests from a FortiGate unit, the FortiGate unit must be registered as a authentication client on the FortiAuthenticator unit.

The FortiAuthenticator RADIUS server is already configured and running with default values. Each user account on the FortiAuthenticator unit has an option to authenticate the user using the RADIUS database.

Every time there is a change to the list of RADIUS authentication clients, two log messages are generated: one for the client change, and one to state that the RADIUS server was restarted to apply the change.

FortiAuthenticator unit allows both RADIUS and remote authentication for RADIUS authentication client entries. If you want to use a remote server, you must configure it first so that you can be select it in the RADIUS authentication client configuration, see Remote authentication servers. You can configure the built-in LDAP server before or after creating client entries, see LDAP service.

Clients

RADIUS accounting client can be managed from Authentication > RADIUS Service > Clients.

Clients can be added, imported, deleted, edited, and cloned as needed.

To configure a RADIUS accounting client:
  1. From the RADIUS client list, select Create New to add a new RADIUS client. The Add RADIUS client window opens.
  2. Enter the following information:
  3. Name A name to identify the FortiGate unit.
    Client name/IP The FQDN or IP address of the unit.
    Secret The RADIUS passphrase that the FortiGate unit will use.
    Description Optionally, enter information about the FortiGate unit.
    Authentication method Select one of the following:
    • Enforce two-factor authentication
    • Apply two-factor authentication if available (authenticate any user)
    • Password-only authentication (exclude users without a password)
    • FortiToken-only authentication (exclude users without a FortiToken).
    Username input format Select one of the following three username input formats:
    • username@realm
    • realm\username
    • realm/username.
    Realms Add realms to which the client will be associated. See Realms.
    • Select a realm from the drop-down list in the Realm column.
    • Select whether or not to allow local users to override remote users for the selected realm.
    • Select whether or not to use Windows AD domain authentication.
    • Edit the group filter as needed. That is, filter users based on the groups they are in.
    • If necessary, add more realms to the list.
    • Select the realm that will be the default realm for this client.
    Allow MAC-based authentication To allow 802.1X authentication for non-interactive devices, FortiAuthenticator can identify and bypass authentication for a device based on its MAC address.
    This is used for devices that do not allow the usual username or password input to perform 802.1X authentication, such as network printers. Enter these units in Authentication > User Management > MAC Devices. For more information, see MAC devices.
      Require Call-Check attribute for MAC-based auth The FortiAuthenticator unit expects the username and password attributes to be set to the source MAC address. This option also requires a Service-Type attribute set to Call Check and a Calling-Station-Id attribute set to the source MAC address.
    Check machine authentication Select to check machine based authentication, and apply groups based on the success or failure of the authentication. See Machine authentication.
      Override group membership when Select the conditions for when a group membership can be overridden from the Only machine-authenticated and Only user-authenticated drop-down lists.
    EAP types Select the 802.1X EAP authentication types to accept. If you require mutual authentication, select EAP-TLS.
    For more information, see EAP.
  4. Select OK to add the new RADIUS client.
If authentication is failing, check that the authentication client is configured and that its IP address is correctly specified. Common causes of problems are:
  • RADIUS packets being sent from an unexpected interface, or IP address.
  • NAT being performed between the authentication client and the FortiAuthenticator unit.

Client profile attributes

FortiAuthenticator supports a single authentication profile for each RADIUS Auth Client. Because of this, authentication requirements (for example IPSec/SSLVPN, Web Filtering Override, Wireless Authentication, and so on) require different profiles, as RADIUS authentication requests originate from the same IP address. To distinguish the authentication requirements, you can add attributes to them.

Attributes (which can be added to authentication requirements) indicate the type of service the user has requested, or the type of service to be provided.

Each FortiAuthenticator Auth Client Profile can contain up to two RADIUS Attributes.

To match a profile, all specified attributes in a profile must match, if not, the processing will fall to the next profile (processed in top down order).

The profiles created can be re-arranged in terms of priority. FortiAuthenticator attempts to match the RADIUS attributes from an authentication request to each profile, starting with the highest-priority profile, and moves down the list until it finds a match. FortiAuthenticator uses the first profile that it matches.

Importing authentication clients

Authentication client information can be imported as a CSV file by selecting Import in the from the RADIUS client list.

The CSV file has one record per line, with the record format: client name (32 characters max), FQDN or IP address (128 characters max), secret (optional, 63 characters max).

Realms

Realms allow multiple domains to authenticate to a single FortiAuthenticator unit. They support both LDAP and RADIUS remote servers. Each RADIUS realm is associated with a name, such as a domain or company name, that is used during the log in process to indicate the remote (or local) authentication server on which the user resides.

For example, the username of the user PJFry, belonging to the company P_Express would become any of the following, depending on the selected format:

The FortiAuthenticator uses the specified realm to identify the back-end RADIUS or LDAP authentication server or servers that are used to authenticate the user.

Acceptable realms can be configured on a per RADIUS server client basis when configured RADIUS service clients. See Clients.

To manage the realms, go to Authentication > RADIUS Service > Realms.

Create New Select to create a new realm.
Delete Select to delete the selected realm or realms.
Edit Select to edit the selected realm.
Name The names of the realms.
User Source The source of the users in the realms.
To create a new realm:
  1. From the realms list, select Create New. The Create New Realm window opens.
  2. Enter a name for the realm in the Name field.
  3. The realm name may only contain letters, numbers, periods, hyphens, and underscores. It cannot start with a special character.
  4. Select the user source for the realm from the User source drop-down list. The options include local users, or users from specific RADIUS or LDAP servers.
  5. Select OK to create the new realm.

Extensible authentication protocol

The FortiAuthenticator unit supports several IEEE 802.1X EAP methods. EAP settings can be configured from Authentication > RADIUS Service > EAP. See EAP for more information.

of