RADIUS SSO example

To create a RADIUS SSO agent:

1. Go to User & Device > Authentication > Single Sign-On and select Create New.

2. In Type, select RADIUS Single-Sign-On Agent.

3. Select Use RADIUS Shared Secret and enter the RADIUS server shared secret.

4. Select Send RADIUS Responses.

5. Select OK.

The Single Sign-On agent is named RSSO_Agent.

 

Creating a RADIUS SSO user group

 

To define a local user group for RADIUS SSO:

1. Go to User & Device > User > User Groups and select Create New.

2. Enter a Name for the user group.

3. In Type, select RADIUS Single Sign-On (RSSO).

4. In RADIUS Attribute Value, enter the name of the RADIUS user group this local user group represents.

5. Select OK.

 

Configuring FortiGate regular and RADIUS SSO security policies

With the RADIUS server and FortiGate interfaces configured, security policies can be configured. This includes both RADIUS SSO and regular policies, as well as addresses and address groups. All policies require NAT to be enabled.

 

Security policies required for RADIUS SSO

Seq. No. From -> To      Type                Schedule                 Description

1               internal -> wan1

2               internal -> wan1

RADIUS SSO    business hours           Authenticate outgoing user traffic.

regular               always                        Allow essential network services and VoIP.

Seq. No. From -> To      Type                Schedule                 Description

3               dmz -> wan1     regular               always                        Allow servers to access Internet.

4               internal -> dmz regular               always                        Allow users to access servers.

5              any -> any         deny                  always                        Implicit policy denying all traffic that hasn’t been matched.

 

The RADIUS SSO policy must be placed at the top of the policy list so it is matched first. The only exception to this is if you have a policy to deny access to a list of banned users. In this case, that policy must go at the top so the RADIUS SSO does not mis- takenly match a banned user or IP address.

 

This section includes:

  • Schedules, address groups, and services groups
  • Configuring regular security policies
  • Configuring RADIUS SSO security policy

 

Schedules, address groups, and services groups

This section lists the lists that need to be configured before security policies are created. Creating these lists is straight forward, so the essential information has been provided here but not step by step instructions. For more information on firewall related details, see

 

Schedules

Only one schedule needs to be configured — business_hours. This is a fairly standard Monday to Friday 8am to 5pm schedule, or whatever days and hours covers standard work hours at the company.

 

Address groups

The following address groups need to be configured before the security policies.

 

Address Group Name Interface Address range included
 

internal_network

 

internal

 

10.11.102.110 to 10.11.102.250

 

company_servers

 

dmz

 

10.11.101.110 to 10.11.101.250

 

Service groups

   

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.