Configuring authentication policies
Auth policies set the conditions that mandate authentication and reference the user group that has authorization. For example, you can define an auth policy that has the following logic: if the Host header matches example.com and the URI matches /index.html, then the group example-group is authorized. FortiADC supports the Basic Authentication Scheme described in RFC 2617.
Authorization and authentication illustrates the client-server communication when authorization is required.
Authorization and authentication
- The client sends an HTTP request for a URL belonging to a FortiADC virtual server that has an authorization policy.
- FortiADC replies with an HTTP 401 to require authorization. On the client computer, the user might be prompted with a dialog box to provide credentials.
- The client reply includes an Authorization header that gives the credentials.
- FortiADC sends a request to the server (local, LDAP, or RADIUS) to authenticate the user.
- The authentication server sends its response, which can be cached according to your user group configuration.
- If authentication is successful, FortiADC continues processing the traffic and forwards the request to the real server.
- The real server responds with an HTTP 200 OK.
- FortiADC processes the traffic and forwards the server response to the client.
Before you begin:
- You must have created the user groups to be authorized with the policy. You also configure users and authentication servers separately. See Configuring user groups.
- You must have read-write permission for Server Load Balance settings.
After you have configured an auth policy, you can select it in the virtual server configuration. Note the following requirements:
- Virtual server type must be Layer 2 or Layer 7.
- Profile type must be HTTP or HTTPS.
- The profile option once-only must be disabled.
To configure an authentication policy:
- Go to User Authentication > Authentication Policy.
- Click Create New to display the configuration editor.
- Complete the configuration as described in Authentication policy configuration.
- Save the configuration.
Settings | Guidelines |
---|---|
Name |
Configuration name. Valid characters are Note: After you initially save the configuration, you cannot edit the name. |
Member |
|
Host Status |
If enabled, require authorization only for the specified host. If disabled, ignore hostname in the HTTP request header and require authorization for requests with any Host header. Disabled by default. |
Host |
Specify the HTTP Host header. If Host Status is enabled, the policy matches only if the Host header matches this value. Complete, exact matching is required. For example, |
Type |
Select either of the following:
|
User Realm |
Realm to which the Path URI belongs. The realm is included in the basic authentication header in the HTTP 401 message sent to the client. If a request is authenticated and a realm specified, the same credentials are deemed valid for other requests within this realm. Available only if Standard is selected as the Type. |
Path |
Require authorization only if the URI of the HTTP request matches this pathname. If none is specified, requests to any URI require authorization. The value is parsed as a match string prefix. For example, |
User Group |
Select the user group that is authorized to access the protected resource. Available only if Standard is selected as the Type. |
SAML SSO ID |
Select the SAML SSO ID that is authorized to access the protected resource. Available only if SAML is selected as the Type. |
OAuth Policy |
Select the OAuth policy that is authorized to access the protected resource. Available only if OAuth is selected as the Type. |