Adding Users
The following section describes how to add users to FortiSIEM CMDB. Once an user is defined, you can do the following functions:
- Allow the user to log in to FortiSIEM GUI
- Allow the user to receive FortiSIEM notification
- Use the users in Analytics (Rules and Reports)
You can add users in one of the following ways:
See Implementation Notes for additional information.
Add Users Manually
Complete these steps to add a user:
- Navigate to CMDB > Users > Ungrouped.
- Click New to create a new user.
- In the New User dialog box, enter the detailed information about this user:
- Add the user profile information including User Name, Full Name, Job Title and Company.
- Click the drop-down list to select the Importance of this user - "Normal", "Important", "Critical", or "Mission Critical".
- Enable Active if this is an active user.
- Enter the user's Domain.
- Enter the user's Distinguished Name DN.
- For User Lockout, select Unlock by Administrator or Delay next login for ## minutes. If Delay next login for ## minutes is selected, enter the number of minutes the user will be unable to log into the system after five successive authentication failures.
- Select the Inactivity Lockout if you wish to enable lockout after a period of inactivity.
- For Password Reset, enter the number of days after which a user’s current password for logging in to the system will automatically expire. If left blank, the user's password will never expire.
- For Idle Timeout, enter the number of minutes after which an inactive user will be logged out.
- Enter the Employee ID of the user.
- Select the Manager to which this user belongs.
- For System Admin, enable by selecting the System Admin checkbox.
- For Mode, select Local or External.
If you select Local, enter and then reconfirm the user password. For External, see Authentication Settings for more information about using external authentication.
Notes:- If more than one authentication profile is associated with a user, then the servers will be contacted one-by-one until a connection to one of them is successful. Once a server has been contacted, if the authentication fails, the process ends, and the user is notified that the authentication failed.
- For local users, passwords must contain between 8 and 64 characters, and must include 1 letter, 1 numeric character and 1 special character.
- Select a Default Role for the user.
See the topic Role Settings for a list of default roles and permission. You can also create new roles, which will be available in this menu after you create them.
If this System Admin user should be allowed to approve de-anonymization requests, ensure the Deobfuscation Approver role has been configured in Role Settings and that this configured role is selected here.
If the System Admin user should be allowed to approve remediation requests, ensure the Remediation Approver role has been configured in Role Settings and that this configured role is selected here. - Click Back when done.
- For Mode, select Local or External.
- Click Contact Info to enter your personal contact information.
- Add user contact information to the appropriate contact information fields - Work Phone, Mobile Phone, Home Phone, SMS, SMS Provider, ZIP, Email, Address, City, State, and Country field.
- If your company uses S/MIME for email, make sure the Email field is filled out, and upload the S/MIME certificate in the Certificate field by clicking Upload, and selecting your certificate.
- Click Back when done.
- Click Alias to enter any alias information for the user.
- In the Alias field, provide the alias user name.
- From the Identity Provider field, enter/select from AWS IAM, DUO, or Microsoft AD.
- In the Description field, enter any additional information about the alias.
- If another Alias is needed, in the Row column, click + to add another row for another alias, and repeat steps i-iii.
- Click Save when done.
- Enter any Description about the user.
- Click Save.
The new user details appear in the list.
Discover Users from Microsoft Active Directory
- Step 1: Create LDAP Login Credentials and Associate with LDAP Server IP Address
- Step 2: Discover Active Directory Server and Users
- Step 3: Set FortiSIEM Attributes for Users
Step 1: Create LDAP Login Credentials and Associate with LDAP Server IP Address
- Log in to your Supervisor node.
- Go to ADMIN > Setup > Credentials.
- Click New.
- Enter a Name.
- For Device Type, select Microsoft Windows.
- Select your Access Protocol.
FortiSIEM supports these LDAP protocols: - For Used For, select Microsoft Active Directory.
- For Base DN, enter the root of the LDAP user tree.
- Enter the NetBIOS/Domain for your LDAP directory.
- Enter the User Name for your LDAP directory.
For user discovery from OpenLDAP, specify the full DN as the user name. For Active Directory, use your server login name. - Enter and confirm the Password for your User Name.
- Click Save.
Your LDAP credentials will be added to the list of Credentials. - Under Enter IP Range to Credential Associations, click Add.
- Select your LDAP credentials from the list of Credentials. Click + to add more.
- Enter the IP/IP Range or host name for your Active Directory server.
- Click Save.
Your LDAP credentials will appear in the list of credential/IP address associations. - Click Test > Test Connectivity to make sure you can connect to the Active Directory server.
Protocol | Settings |
---|---|
LDAP | [Required] IP Host - Access IP for LDAP Port - Non-secure version on port 389 |
LDAPS | [Required] IP Host - Access IP for LDAPS Port - Secure version on port 636 |
LDAP Start TLS | [Required] IP Host - Access IP for LDAP Start TLS Port - Secure version on port 389 |
Step 2: Discover Active Directory Server and Users
- Go to ADMIN > Setup > Discovery.
- Click New.
- For Name, enter Active Directory.
- For Include Range, enter the IP address or host name for your Active Directory server.
- Leave all the default settings, but clear the Discover Routes under Options.
- Click OK.
Active Directory will be added to the list of discoverable devices. - Select the Active Directory device and click Discover.
- After discovery completes, go to CMDB > Users to view the discovered users.
You may need to click Refresh for the user tree hierarchy to load.
Step 3: Set FortiSIEM Attributes for Users
- From the CMDB > Users page, select the user, and click Edit.
- From the Manager drop-down list, select the Manager which this user belongs.
- For System Admin, enable by selecting the System Admin checkbox.
- For Mode, select Local or External.
If you select Local, enter and then reconfirm the user password. For External, see Authentication Settings for more information about using external authentication.
Note: If more than one authentication profile is associated with a user, then the servers will be contacted one-by-one until a connection to one of them is successful. Once a server has been contacted, if the authentication fails, the process ends, and the user is notified that the authentication failed. - Select a Default Role for the user.
See the topic Role Settings for a list of default roles and permission. You can also create new roles, which will be available in this menu after you create them.
- For Mode, select Local or External.
- Click Save.
Discover Users from OKTA
- Step 1: Prepare OKTA for Authentication
- Step 2: Create an OKTA API Token
- Step 3: Create OKTA Login Credentials in FortiSIEM and Associate with OKTA Server
- Step 4: Discover OKTA Users
- Step 5: Set FortiSIEM Attributes for Users
Step 1: Prepare OKTA for Authentication
To use Okta authentication for your FortiSIEM deployment, you must set up a SAML 2.0 Application in Okta, and then use the certificate associated with that application when you configure external authentication.
- Log into Okta.
- In the Applications tab, create a new application using Template SAML 2.0 App.
- Under Settings, configure the settings similar to the table below:
Post Back URL Post Back URL Application label FortiSIEM Demo Force Authentication Enable Post Back URL https://<FortiSIEMIP>/phoenix/okta Name ID Format EmailAddress Recipient FortiSIEM Audience Restriction Super authnContextClassRef PasswordProtectedTransport Response Signed Assertion Signed Request Uncompressed Destination https://<FortiSIEMIP>/phoenix/okta - Click Save.
- In the Sign On tab, click View Setup Instructions.
- Click Download Certificate.
- Follow the instructions above and enter the downloaded certificate for Okta authentication.
Step 2: Create an OKTA API Token
- Log in to Okta using your Okta credentials.
- Got to Administration > Security > API Tokens.
- Click Create Token.
You will use this token when you set up the Okta login credentials in the next section. Note that this token will have the same permissions as the person who generated it.
Step 3: Create OKTA Login Credentials in FortiSIEM and Associate with OKTA Server
- Log in to your Supervisor node.
- Go to ADMIN > Setup > Credentials.
- Click New.
- Enter a Name.
- For Device Type, select OKTA.com OKTA.
- For Access Protocol, select OKTA API.
- Enter the Pull Interval in minutes.
- Enter the Domain associated with your Okta account.
For example,FortiSIEM.okta.com
. - Enter and reconfirm the Security Token you created.
- Enter any related information in Description.
- Click Save.
Your Okta credentials will be added to the list of Credentials. - Under Enter IP Range to Credential Associations, click New.
- Enter the IP/IP range or host name for your Okta account.
- Select your Okta credentials from the list of Credentials. Click + to add more.
- Click Save.
Your Okta credentials will appear in the list of credential/IP address associations. - Click Test > Test Connectivity to make sure you can connect to the Okta server.
Step 4: Discover OKTA Users
If the number of users is less than 200, then Test Connectivity will discover all the users. Okta API has some restrictions that do not allow FortiSIEM to pull more than 200 users. In this case, follow these steps:
- Log in to Okta.
- Download user list CSV file (OktaPasswordHealth.csv) by visiting Admin > Reports > Okta Password Health.
- Rename the CSV file to
all_user_list_%s.csv
. (%s
is the placeholder of token obtained in Create an Okta API Token - Step 3, e.g.all_user_list_00UbCrgrU9b1Uab0cHCuup-5h-6Hi9ItokVDH8nRRT.csv
). - Log in to FortiSIEM Supervisor node:
- Upload CSV file
all_user_list_%s.csv
to this directory/opt/phoenix/config/okta/
- Make sure the permissions are
admin
andadmin
(Runchown -R admin:admin /opt/phoenix/config/okta/
) - Go to ADMIN > Setup > Credentials > Enter IP Range to Credential Associations.
- Select the Okta entry and run Test > Test connectivity to import all users.
- Upload CSV file
Step 5: Set FortiSIEM Attributes for Users
- From the CMDB > Users page, select the user, and click Edit.
- From the Manager drop-down list, select the Manager which this user belongs.
- For System Admin, enable by selecting the System Admin checkbox.
- For Mode, select Local or External.
If you select Local, enter and then reconfirm the user password. For External, see Authentication Settings for more information about using external authentication.
Note: If more than one authentication profile is associated with a user, then the servers will be contacted one-by-one until a connection to one of them is successful. Once a server has been contacted, if the authentication fails, the process ends, and the user is notified that the authentication failed. - Select a Default Role for the user.
See the topic Role Settings for a list of default roles and permission. You can also create new roles, which will be available in this menu after you create them.
- For Mode, select Local or External.
- Click Save.
Implementation Notes
- For Service Provider deployments:
- If you add users as a Super/Global admin, then the added users will be in the Super/Global group.
- If you login to a specific Organization and create users there, then the users will belong to that Organization.
- When viewing this user list as a Super global user, you may see repetitions of a few User Names, where those names exist in multiple Organizations. This can be determined by checking the contents of the Organization column.
- Repetition of User Names may also occur if an LDAP server has moved from one Organization to another and discovery of that LDAP server introduces users from the previous organization who may share the same user name. In this case, the administrator may wish to remove users that are no longer applicable.
- An Agent User can be created by navigating to ADMIN > Setup > Organization, and clicking New or Edit. These types of Admin Users are not allowed to log into the UI. Their primary purpose is for Windows Agent registration against the FortiSIEM environment. See Setting Organizations and Collectors (Service Provider) for more information.