Hot!Kerberos Authentication Configuration

Author
KhizerSaleem
New Member
  • Total Posts : 14
  • Scores: 0
  • Reward points: 0
  • Joined: 2018/05/31 00:47:07
  • Status: offline
2018/05/31 01:24:58 (permalink)
0

Kerberos Authentication Configuration

Hi All,
 
I need the authentication while using explicit-web-proxy.
 
The matter of fact is that obviously, it needs Kerberos authentication for authentication of AD-Users but in the documents on the given link below, by Fortinet, it didn't give us the picture clearly. I read the authentication document in which it defines all Kerberos authentication process. 
 
http://help.fortinet.com/...it%20proxy%20users.htm
 
 Can I configure the FortiOS 5.6.x authentication settings on FortiOS 6.0, as I'm using this on Fortigate-VM 64 on evaluation period, or I need to set up the only Kerberos environment?
 
I want to know that is there any good guide or any video that can show us how to configure the process or do you have any kind of notes regarding this. 
 
Hope to see your kind reply soon.
 
Thnks in advance.
 
Best Regards
Khizer Saleem
#1

11 Replies Related Threads

    xsilver_FTNT
    Expert Member
    • Total Posts : 434
    • Scores: 93
    • Reward points: 0
    • Joined: 2015/02/02 03:22:58
    • Status: online
    Re: Kerberos Authentication Configuration 2018/05/31 04:57:18 (permalink)
    0
    Hi,
    mentioned help doc is quite complex and should cover most of the usual configuration variants.
    Basically said you have to decide between explicit/transparent proxy and ip-based/session-based authentication.
    And then follow the steps for one of those four basic config variants.
    Config is supposed to be same or very similar (not aware of any deviation) between 5.6 and 6.0 FortiOS.
    You need those parts .
    - LDAP server and group
    - KRB keytab
    - policy
    - config authentication parts defining schedules/rules etc.
     
    Kind regards,
    Tomas

    Kind Regards,
    Tomas
    #2
    KhizerSaleem
    New Member
    • Total Posts : 14
    • Scores: 0
    • Reward points: 0
    • Joined: 2018/05/31 00:47:07
    • Status: offline
    Re: Kerberos Authentication Configuration 2018/05/31 23:11:00 (permalink)
    0
    Hi,
     
    Well, thanks Tomas for your kind reply, yes the document is too complex neither Fortinet made any video on their video library, so its too complex I tried all the things but don't know which thing is missing.
     
    Thanks for your reply.
     
    Best Regards
    Khizer Saleem
     
    #3
    FortiBoris_FTNT
    New Member
    • Total Posts : 14
    • Scores: 0
    • Reward points: 0
    • Joined: 2016/09/20 01:16:45
    • Status: offline
    Re: Kerberos Authentication Configuration 2019/02/22 23:31:23 (permalink)
    0
    Hey all,

    Doing some Kereros + Explicit Proxy testings on v6.0.4.

    Simple question, how is a user mapped towards multiple AD groups?? For the moment it seems i'm mapped to the 1st group alphabetically and not multiple groups.

    The idea would be multiple AD groups mapped to different Explicit Proxy rules each having different Web Filtering profiles applied. Although, we would want to have the possibility to map users within multiple groups, hence mapped to different Web Filtering profile (Social_Surfers, Sports_Surfers, Hacking_Surfers etc...). You add Bob within Social_Surfers group @AD and it dynamically can surf Social Networks on the fly while keeping it's previous surfing "rights" from say Sports_Surfers where he also belongs.
     
    That scheme is possible with FSSO but couldn't reach my goal with Kerberos. User seems mapped to only ONE group while being members of more than one.
     
    Thanks,
    Boris
    post edited by FortiBoris_FTNT - 2019/02/22 23:34:48
    #4
    KhizerSaleem
    New Member
    • Total Posts : 14
    • Scores: 0
    • Reward points: 0
    • Joined: 2018/05/31 00:47:07
    • Status: offline
    Re: Kerberos Authentication Configuration 2019/02/23 01:09:23 (permalink)
    0
    Hi Boris,
     
    You just have to make that users part of multiple AD-Groups, and then map that AD Groups in FSSO agent under Fabric Connector tab, and then map that FSSO objects in the groups.
    After making groups, you can call them in multiple rules.
     
    I used the proxy setup on 6.0.3 but with NTLM method(session-based) and it was more secure and feasible.
     
    Regards
    Khizer Saleem
    #5
    FortiBoris_FTNT
    New Member
    • Total Posts : 14
    • Scores: 0
    • Reward points: 0
    • Joined: 2016/09/20 01:16:45
    • Status: offline
    Re: Kerberos Authentication Configuration 2019/02/23 04:38:44 (permalink)
    0
    Hey there Khizer,

    thanks for the update.. yes i saw that this is working with FSSO but wanted to achieve the same with Kerberos.. the FSSO polling agent at the FortiGate isn't supposed to scale at more than 200 users i think. hence the need for Kerberos..

    cheers,
    boris
    #6
    KhizerSaleem
    New Member
    • Total Posts : 14
    • Scores: 0
    • Reward points: 0
    • Joined: 2018/05/31 00:47:07
    • Status: offline
    Re: Kerberos Authentication Configuration 2019/02/23 08:08:27 (permalink)
    0
    Hi Boris,
     
    No no, you are not clear on it. You can add 1000+ AD groups per single FSSO Object, and it's confirmed.
    I consult the Fortinet TAC engineer while doing my project of the explicit web proxy. Unfortunately, I lost that table in which exact numbers were given, but I',m 100% sure it's feasible and secure too. 
     
     
    Regards
    Khizer Saleem
     
    #7
    KhizerSaleem
    New Member
    • Total Posts : 14
    • Scores: 0
    • Reward points: 0
    • Joined: 2018/05/31 00:47:07
    • Status: offline
    Re: Kerberos Authentication Configuration 2019/02/23 08:18:05 (permalink)
    0
    Hi Boris
     
    Forgot to mention that, always use the FSSO agent installed on Domain controller in the big AD environment.
     
    For more assistance, you can contact me on my personal email, khizersaleem1992@gmail.com
     
    Regards
    Khizer Saleem
     
     
    #8
    KhizerSaleem
    New Member
    • Total Posts : 14
    • Scores: 0
    • Reward points: 0
    • Joined: 2018/05/31 00:47:07
    • Status: offline
    Re: Kerberos Authentication Configuration 2019/02/23 08:24:21 (permalink)
    0
    Hi Boris
     
    You are lucky, after searching for more than an hour, I finally got the table. Here is the link for your consideration.
     
    https://help.fortinet.com/fgt/54/max-values/5-4-3/max-values.html
     
    You can find the detail of AD Groups and FSSO Servers too.
     
    Best Regards
    Khizer Saleem
     
    #9
    FortiBoris_FTNT
    New Member
    • Total Posts : 14
    • Scores: 0
    • Reward points: 0
    • Joined: 2016/09/20 01:16:45
    • Status: offline
    Re: Kerberos Authentication Configuration 2019/03/09 09:24:10 (permalink)
    0
    Hi,
     
    Just for the feedback, this works perfectly with Kerberos and user is seen with "every" AD groups he's belonging in. You can check the user group mapping seen at FGT with those CLIs:
     
    # diag debug enable
    # diag test app wad 2200 // 22xx (xx=process number)
    # diag test app wad 110


    [1]     user:bob@FPOC.LAN@1.1.1.1(0x7f8d9089d1a0), type:SES, vf:0, ref:211, ntlm:0, has_fsae:0, guest:0
                    user:1(0x7f8d912445a8), ip:1(0x7f8d913ad568), scheme=3, auth=yes, tfa=no, timeout:alive, id:1
                    time: create=39(near=1) access=16 auth=101 traffic=1
                    out_ip=0.0.0.0 out_ipv6=:: ftp_out_ip=0.0.0.0
                    concurrent user limit: 65536 lifetime=39s, creation time:Mon Feb 25 12:04:52 2019

        membership_type=1 number=2 srv/is_ldap=WIN-DC-LDAP/1:
        [member 1 len=46]: cn=surfers_hackers,cn=users,dc=fpoc,dc=lan
        [member 2 len=43]: cn=domain users,cn=users,dc=fpoc,dc=lan


    Hence crafting explicit proxy rules toward different users groups works all fine.
     
    Thanks
    Boris
    post edited by FortiBoris_FTNT - 2019/03/09 09:26:33
    #10
    slashdes
    New Member
    • Total Posts : 2
    • Scores: 0
    • Reward points: 0
    • Joined: 2017/11/09 05:39:06
    • Status: offline
    Re: Kerberos Authentication Configuration 2019/04/10 09:34:00 (permalink)
    0
    Hi! I have 2 ADs, and configured for kerberos auth fortigate 200e on it. It's works. But I have the issue, in some app. I have response for ntlm auth., but internet works on PC. I type the creds of my AD user, and see log on fortigate-ntlm auth failed ,user NA. Somebody have any ideas
    #11
    xsilver_FTNT
    Expert Member
    • Total Posts : 434
    • Scores: 93
    • Reward points: 0
    • Joined: 2015/02/02 03:22:58
    • Status: online
    Re: Kerberos Authentication Configuration 2019/04/10 23:14:55 (permalink)
    5 (1)
    Hi,
    I might have few ideas .. 
     
    1. log in from browser first as most of the custom apps are politely said network hostile and do not handle even basic networking like port usage and releases properly. And authentication ... muhehe. MOst app don't do NTLM.
     
    2. on FGT .. how about some basic networking / auth troubleshooting?
    diag debug app fnbamd 7
    diag debug auth -1
    diag sniff pack any 'host <DC-IP> and port 88 or 389' 6 0 a   ... or GUI packet capture towards DC

    Kerberos should communicate on udp port 88 and DC LDAP by default on port 389. So check if you got ticket granted.
    If your tokens are short and starts with T1R then those are NTLM (as 'negotiate' Auth method offer client ability to choose between NTLM and Kerberos token).
     
     
    3. on workstation you can check if you do have a key via cmd: klist
    or sniff via Wireshark as well.
     
    Config examples on: 
    http://help.fortinet.com/...it%20proxy%20users.htm
     

    Kind Regards,
    Tomas
    #12
    Jump to:
    © 2019 APG vNext Commercial Version 5.5