LAB 05 Fortinet Single Sign-On Configuration
LAB 05 Fortinet Single Sign-On Configuration
Sumário
Lab 5 Fortinet Single Sign-On Configuration ................................................................................................. 3
Objectives ............................................................................................................................................. 3
Exercise 1: Configuring FortiGate for FSSO Authentication ........................................................................ 4
Review the FSSO Configuration on FortiGate......................................................................................... 4
Assign FSSO Users to a Firewall Policy.................................................................................................. 7
Test FSSO........................................................................................................................................... 8
To monitor communication between the FSSO collector agent and FortiGate .......................................... 9
To display the FSSO logon events ......................................................................................................... 9
To monitor FSSO logon events ........................................................................................................... 10
2
Lab 5 Fortinet Single Sign-On Configuration
In this lab, you will test user authentication using Fortinet Single Sign-On (FSSO). The lab uses a demo
environment to emulate the behavior of an active FSSO DC agent from the Local-Client VM using a Python
script. Therefore, you will not configure a DC agent to send logon events from the Local-Client VM.
Objectives
• Review the FSSO configuration on FortiGate
• Test the transparent or automatic user identification by generating user logon events
Time to Complete
Estimated: 35 minutes
3
Exercise 1: Configuring FortiGate for FSSO Authentication
In this exercise, you will configure FortiGate for FSSO and test user authentication. The lab uses a demo
environment to emulate the behavior of an active FSSO DC agent from the Local-Client VM using a Python
script. Therefore, you will not configure a DC agent to send logon events from the Local-Client VM.
For FortiGate to communicate and poll information from the FSSO collector
agent, you must assign the polled user to a firewall user group, and then add the
user group as a source on a firewall policy.
Finally, you can verify the user logon event that FortiGate collects. This event is
generated after a user logs in to the Windows Active Directory domain.
Therefore, no firewall authentication is required.
To review the FSSO server and FSSO user group configuration on FortiGate
1. Connect to the Local-FortiGate GUI, and then log in with the username admin and password password.
4. In the upper-right corner, review the Endpoint/Identity status, and see that the status
is Disconnected.
4
To run a script to simulate a user logon event
1. On the Local-Client VM, open a terminal window, and then enter the following commands to simulate a
user logon event:
cd Desktop/FSSO/
5. Click OK.
A green up arrow confirms that the communication with the FSSO collector agent is up.
5
To assign the FSSO user to an FSSO user group
1. Continuing on the Local-FortiGate GUI, click User & Authentication > User Groups.
Field Value
Name Training
Members TRAININGAD/AD-USERS
The FSSO user is automatically listed because of the selected group type—
FSSO.
3. Click OK.
6
Assign FSSO Users to a Firewall Policy
You will assign your FSSO user group as a source in a firewall policy. This allows you to control access to
network resources based on user identity.
To test the connection without assigning the FSSO user group to a firewall policy
1. On the Local-Client VM, open a new browser, and then go to https://www.fortinet.com.
You can see that all users can access the Fortinet website.
4. In the Select Entries section, select User, and then add the Training group.
7
Test FSSO
After a user logs in, they are automatically identified based on their IP address. As a result, FortiGate allows the
user to access network resources as policy decisions are made. You will test FSSO.
To test the connection after assigning the FSSO user to the firewall policy
1. On the Local-Client VM, open a new browser tab, and then go to http://support.fortinet.com.
The Python script that is running on the Local-Client VM is already sending user
logon events with the following information:
• user: aduser1
• IP: 10.0.1.10
In this case, the website loads successfully because aduser1 belongs to the
configured user group on a firewall policy.
To review the connection status between the FSSO collector agent and FortiGate
1. On the Local-FortiGate CLI, log in with the username admin and password password.
2. Enter the following commands to show the connection status between FortiGate and each collector
agent:
8
To monitor communication between the FSSO collector agent and FortiGate
1. Continuing on the Local-FortiGate CLI, log in with the username admin and password password.
3. On the Local-Client VM, on a terminal window, press Ctrl+C to stop the script, and then enter the
following command again to simulate a user logon event:
You generated a logon event on the Local-Client VM using the script, and it was
forwarded to FortiGate.
----FSSO logons----
9
To review the user event logs
1. Connect to the Local-FortiGate GUI, and then log in with the username admin and password password.
2. Click Log & Report > System Events, and then in the User Events widget, click the View Logs arrow.
3. Select a log, and then click Details to view more information about it.
2. Click Show all FSSO Logons, and then click Refresh if the user's details don't appear.
10