Hello there!

Need Help? We are right here!

miniOrange Email Support

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com

Two Factor Authentication for Fortinet VPN Client

miniOrange provides a ready to use solution for Fortinet VPN Client Platform. This solution ensures that you are ready to roll out secure access to Fortinet VPN Client to your employees within minutes.

Fortinet VPN Client

Fortinet provides physical and virtualized security designs and appliances for important data and critical workload. You can enable two-factor authentication (2FA) for your Fortinet managed active directory to increase the security level. When you enable 2FA, your users enter their username and password (first factor) as usual, and they have to enter an authentication code (the second factor) which will share on your virtual or hardware 2FA solution.
To enable 2FA you can enable RADIUS authentication in Fortinet and configure policies in miniOrange to enable or disable 2FA for users.

miniOrange 2FA for VPN Login

  • miniOrange accomplishes this by acting as a RADIUS server, that accepts the username/password of the user entered as a RADIUS request, validates the user against the user store as Active Directory ( AD ), prompts him for the 2-factor authentication and either grants/revokes access based on the input by the user.

  • Types of 2FA Authentication with RADIUS

  • The 2-factor authentication can be of two types depending on the VPN clients.

    • VPN Clients that support RADIUS Challenge.
    • VPN Clients that do not support RADIUS Challenge.

  • In VPN Clients that support RADIUS Challenge :

    • First step is user's username & password get validated against the credentials stored in Active Directory and 2nd request sends a success response, this request is sent to validate the 2-factor authentication of the user, on successful authentication user is granted access to the application.
    • Authentication methods : All Authentication methods supported by miniOrange. Software Token, Push Notification, OTP over Email to name a few.
    • RADIUS Clients that support this authentication type:
      -> OpenVPN
      -> Palo Alto
      -> Fortinet
      -> Pulse Secure Connect Secure SSL
    • MFA for Fortinet VPN Client: fortinet-support-chart

    We can connect with any Directory

    miniOrange provides user authentication from external directories like Microsoft Active Directory, Azure AD, AWS Cognito etc.

    Can't find your Directory ? Contact us on idpsupport@xecurify.com. We'll help you setting it up in no time.

    Enable Two-Factor Authentication (2FA) for your VPN managed active directory to increase security level

    Step 1: Add the Radius Client in miniOrange

    • Login into the Admin Dashboard.
    • Click on Apps >> Manage Apps.
    • Click on Configure Apps.
    • MFA for VPN Client: VPN configure apps

    • Select Radius tab and select Radius Client.
    • MFA for VPN Client: VPN radius client

    • Configure details below to add Radius Client.
    • Client Name: Any name for your reference
      Client IP: IP address of VPN server which will send Radius authentication request
      Shared Secret: Security key.
      For Eg. "sharedsecret"
      (Keep this with you, you will need to configure same on VPN Server )
      Do not Support Challenge: Keep this Unchecked
    • Click on Save.
    • MFA for VPN Client: VPN Add App

      NOTE: For On-Premise version follow the below steps before testing the connectivity.

      Only For On-Premise Version

    • By Default, the RADIUS Server does not get started with Tomcat.
    • Open the WEB.xml file from your miniOrange repository .....\mo-idp-server-3.3.0\moas\WEB_INF\web.xml
    • Search for RadiusServerInit.
    • MFA for VPN Client: Enable radius exchangeprotocol

    • Uncomment the commented RadiusServerInit Servlet.
    • Keep the port 1812 open for using RADIUS Service.
    • Save and Restart Tomcat.

    Step 2: Setup Active Directory as an Authentication Source

    • Select User Stores then click on Add User Store.
    • MFA for VPN Client: VPN App Add User

    • Select “AD/LDAP” tab and configure it with your LDAP settings.
    • MFA for VPN Client: VPN App Add User Store

      Directory Type:Active Directory.
      LDAP Server URL:Select an appropriate prefiller followed by your AD server URL or IP address
      Bind Account DN:UserPrincipalName/distinguishedName of the account eligible for binding operation.
      Bind Account Password:Password for the account used for binding
      Search Bases:Provide distinguished name of the Search Base object Eg:cn=User,dc=domain,dc=com
      Search Filter:Search filters enable you to define search criteria and provide a more efficient and effective searches. Eg: "(&(objectClass=*)(cn=?))"

    • Enable “Active LDAP” and “Sync user in miniOrange” option and click on save.
    • MFA for VPN Client: VPN App Save Settings

    • Here's the list of the attributes and what it does when we enable it. You can enable/disable accordingly.
    • AttributeDescription
      Activate LDAP All user authentications will be done with LDAP credentials if you Activate it
      Sync users in miniOrange Users will be created in miniOrange after authentication with LDAP
      Backup Authentication If LDAP credentials fail then user will be authenticated through miniOrange
      Allow users to change password This allows your users to change their password. It updates the new credentials in your LDAP server
      Enable administrator login On enabling this, your miniOrange Administrator login authenticates using your LDAP server
      Show IdP to users If you enable this option, this IdP will be visible to users
      Send Configured Attributes If you enable this option, then only the attributes configured below will be sent in attributes at the time of login

    • Click on Test Configuration to check whether your LDAP configuration details are right and LDAP server is reachable. It will ask for test username & password from LDAP directory.
    • MFA for VPN Client: VPN App Test Configuration

    • After this, it will show you the list of User stores. Click on “ Make Default “.
    • MFA for VPN Client: VPN App Make Default

    Step 3: Setup miniOrange as Identity Provider(Optional)

    NOTE: Follow these steps if you want to keep your users in miniOrange and authenticate against them.

    • Select User then click on Add User .
    • MFA for VPN Client: User tab

      MFA for VPN Client: Add User

    • Configure the basic details for the End User.
    • Then Click on Create User.
    • MFA for VPN Client: Add User form in miniorange

    • You can view these users in UserList.
    • MFA for VPN Client: User list in miniorange

    Step 4: Configure 2 Factor Authentication(2FA) for Admins:

    • From your Admin Dashboard in the left navigation bar, select 2- Factor Authentication, click on Configure 2FA.
    • MFA for VPN Client: configure_2fa

      MFA for VPN Client: select_2fa

    • Select a 2FA method for configuring.
    • Let's say you want to configire OTP over SMS
    • Click on OTP over SMS in Configure 2FA tab.
    • MFA for VPN Client: otp_over_sms

      MFA for VPN Client: enter_phone_no

    • Now add your mobile number on which you want to receive the OTP.
    • Then click on Save.
    • MFA for VPN Client: save_phone_number

      MFA for VPN Client: otp_over_sms_active

    • Reconfigure tab in green represents the currently Active 2FA method.
    • Click on Prompt for second factor during signin to your console.
    • Then click on Save.
    • MFA for VPN Client: Enable_2fa

    • Similarly other 2FA methods can be configured. Click Here for the Guide

    Step 5: Setup 2FA Policy for End User.

    • Click on Policies tab >> App Authentication Policy.
    • MFA for VPN Client: VPN App Authentication Policy

    • Click on Add Policy tab.
    • In Step 1 Select the RADIUS App that we configured earlier.
    • In Step 2 Select “DEFAULT” in Group Name and enter Policy name as “<Any Name>” and Select First factor as “PASSWORD”.
    • Enable Second Factor then click on Save.
    • MFA for VPN Client: VPN App Add Policy

    • Admin can change the second factor of the End user from the User List
    • MFA for VPN Client: User list in miniorange

    • Under Action Click on Select and then select Reset Second Factor
    • MFA for VPN Client: User list in miniorange and Reset second factor

    Step 6: Add miniOrange as RADIUS Server in FortiGate

    • Login to Fortinet Admin console for the VPN application.
    • Go to User & Device >>RADIUS Servers in left navigation bar and click on Create New.
    • MFA for Fortinet VPN Client: Fortinet-vpn-radius-servers

    • Here you need to configure the RADIUS Server
    • MFA for Fortinet VPN Client: fortinet VPN App Radius server configuration

    • Configure details below to add Radius Server.
    • Name: Appropriate name. Eg: mo-radius-server
      Authentication Method: Click on Specify and then select PAP in the Dropdown
      Primary Server IP / Name: For on-premise version: IP of server where IDP(miniOrange) is installed
      For cloud version: Contact us at info@xecurify.com to get the IP
      Primary Server Secret Secret Key for the Fortinet (RADIUS) App defined in step 1
      Secondary Server IP / Name: Optional
      Secondary Server Secret Optional
    • To Save these settings click OK.

    Step 7: Test Connectivity

    • You can now verify the connectivity by clicking on Test Connectivity.
    • MFA for Fortinet VPN Client: Fortinet-vpn-radius-server--test-connectivity

    Step 8: Create a User Group in Fortinet

    • NOTE: If you have a existing User Group then just add miniOrange Radius Server as the Remote Server. If not, then follow the below steps.
    • Select User & Device >> User >> User Groups.
    • To Create New group, Click on Create New.
    • MFA for Fortinet VPN Client: User-groups-fortinet

    • Select Firewall in Type. Click on Add in the Remote Group Section and select miniOrange Radius Server as the Remote Server.
    • MFA for Fortinet VPN Client: User-groups-configuration-fortinet

    • Click on Ok.

    Step 9: Set Up VPN in Fortigate Admin Console.

    • Create a IPSec Tunnel using IPSec Wizard if you have no Tunnel Configured. Click Here to learn more.
    • Select VPN >> IPSec Tunnels and select the IPSec Tunnel you have configured.
    • MFA for Fortinet VPN Client: IPSec VPN Selection

    • Click on Convert To Custom Tunnel if the tunnel is not Custom Tunnel.
    • MFA for Fortinet VPN Client: IPSec VPN Selection

    • Click on Edit button for XAuth section.
    • Select PAP Server in the Type Dropdown.
    • MFA for Fortinet VPN Client: IPSec VPN XAuth

    • Select the User Group configured in Step 4 in User Group Dropdown.
    • MFA for Fortinet VPN Client: IPSec VPN XAuth

    • Click on Ok.

    Step 10: Configure the Fortinet timeout with miniOrange RADIUS server

    • Fortinet default timeout is 5 Seconds, which is insufficient while setting up MFA. We have to reconfigure the timeout to 30 Seconds.
    • So connect to the appliance CLI.
    • And execute below commands in command line: #config system global #set remoteauthtimeout 30 #end
    • MFA for Fortinet VPN Client: Command Line Interface

    Step 11: Test miniOrange 2FA setup for Fortinet VPN Login

    • Login to Fortinet and enter Username and Password.
    • MFA for Fortinet VPN Client: fortinet-vpn-login-console

    • It will prompt for a Second Factor Code if you have Enabled 2-Factor Authentication in miniOrange Policy.
    • MFA for Fortinet VPN Client: fortinet-vpn-login-console-2fa

    • Enter your 2-Factor Code and you should be connected to the VPN.
    • NOTE: While configuring IPSec VPN connection in FortiClient make sure to use the Pre-Shared key of the IPSec Tunnel that was created LAST. Fortinet has issues if multiple IPSec Tunnels are present at FortiGate Server
    • On passing the valid credentials you can see the screen below:
    • MFA for Fortinet VPN Client: fortinet-vpn-login-sucess

    • If you enter an incorrect value you will be redirected to the below screen.
    • MFA for Fortinet VPN Client: fortinet-vpn-login-failure

    For Further Details:

    Two Factor authentication

    We offer Security Solutions of Single Sign-On, Two Factor Authentication, Fraud Prevention and much more.

    Please call us at +1978 658 9387 (US), +91 77966 99612 (India) or email us at info@xecurify.com