Configuring user groups
User groups are authorized by the virtual server authentication policy. The user group configuration references the authentication servers that contain valid user credentials.
Suggested steps:
- Configure LDAP, RADIUS, and NTLM servers, if applicable.
- Configure local users.
- Configure user groups (reference servers and local users).
- Configure an authentication policy (reference the user group).
- Configure the virtual server (reference the authentication policy).
Before you begin:
- You must have created configuration objects for any LDAP, RADIUS, and/or NTLM servers you want to use, and you must have created user accounts for local users.
- You must have read-write permission for System and User settings.
After you have created user groups, you can specify them in the server load balancing authentication policy configuration.
To configure a user group:
- Go to User Authentication > User Group.
- Click Create New to display the configuration editor.
- Complete the configuration as described in User group configuration.
- Save the configuration.
Settings | Guidelines |
---|---|
Name |
Configuration name. Valid characters are After you initially save the configuration, you cannot edit the name. |
User Cache |
Enable to cache the credentials for the remote users (LDAP, RADIUS) once they are authorized. |
Cache Timeout |
Timeout for cached user credentials. The default is 300 seconds. The valid range is 1-86,400 seconds. |
Authentication Timeout |
Timeout for query sent from FortiADC to a remote authentication server. The default is 2,000 milliseconds. The valid range is 1-60,000 milliseconds. |
Authentication Log |
Specify one of the following logging options for authentication events:
|
Client Authentication Method |
|
Group Type |
|
Authentication Relay |
Select an authentication relay profile. |
Authentication Session Timeout |
Specify the authentication session timeout. Valid values range from 1 to 180 minutes. The default is 3 (minutes). |
SSO Support |
Disabled by default. When enabled, you must specify the SSO domain. See below. Note: Let's suppose that you add two or more virtual servers on FortiADC and they all use the same authentication relay, and then you set the Group Type (above) to SSO and enable SSO Support. When a client visits different services within the defined domain, only in the first request needs to be authenticated. Once authenticated, the client can visit all other services in the same domain. |
SSO Domain |
Specify the SSO domain. |
Log-off URL |
Specify the log-off URL. |