Fortinet black logo

Cookbook

Configuring Captive Portal and security policies

Copy Link
Copy Doc ID 53d09085-7746-11e9-81a4-00505692583a:989176
Download PDF

Configuring Captive Portal and security policies

  1. On the FortiGate, go to Network > Interfaces and edit the internal interface.
  2. Under Admission Control, set Security Mode to Captive Portal.

    Set Authentication Portal to External, and enter the SAML authentication portal URL.

    Set User Access to Restricted to Groups, and set User Groups to any local group, as you’ll notice the FSSO group is not available; this local group won’t be used for access.

  3. Next go to Policy & Objects > Addresses and add the FortiAuthenticator as an address object.
  4. Then create five FQDN objects: one of your Okta developer page and the following:
  • eum-col.appdynamics.com
  • login.okta.com
  • ocsp.digicert.com
  • op1static.oktacdn.com

As these are FQDNs, make sure to set Type to FQDN.

  • Then go to Policy & Objects > IPv4 Policy and create all policies shown in the examples: a policy for DNS, for access from FortiAuthenticator, for Okta bypass, and the last policy for FSSO, including the SAML user group.
  • When finished, right-click each policy (except the FSSO policy), select Edit in CLI, and enter the following command:
  • set captive-portal-exempt enable

    next

    end

    This command will exempt users of this policy from the captive portal interface.

    Configuring Captive Portal and security policies

    1. On the FortiGate, go to Network > Interfaces and edit the internal interface.
    2. Under Admission Control, set Security Mode to Captive Portal.

      Set Authentication Portal to External, and enter the SAML authentication portal URL.

      Set User Access to Restricted to Groups, and set User Groups to any local group, as you’ll notice the FSSO group is not available; this local group won’t be used for access.

    3. Next go to Policy & Objects > Addresses and add the FortiAuthenticator as an address object.
    4. Then create five FQDN objects: one of your Okta developer page and the following:
    • eum-col.appdynamics.com
    • login.okta.com
    • ocsp.digicert.com
    • op1static.oktacdn.com

    As these are FQDNs, make sure to set Type to FQDN.

  • Then go to Policy & Objects > IPv4 Policy and create all policies shown in the examples: a policy for DNS, for access from FortiAuthenticator, for Okta bypass, and the last policy for FSSO, including the SAML user group.
  • When finished, right-click each policy (except the FSSO policy), select Edit in CLI, and enter the following command:
  • set captive-portal-exempt enable

    next

    end

    This command will exempt users of this policy from the captive portal interface.