Authentication
Locked out/inactive users, RADIUS sessions, the Windows AD server and device login sessions, and learned RADIUS users can be monitored under Monitor > Authentication.
Locked-out users
To view the locked-out users, go to Monitor > Authentication > Locked-out Users.
To unlock a user from the list, select the user and select Unlock. The list can be refreshed by selecting Refresh, and searched using the search field.
The list shows the username, server, the reason the user was locked out, and when their lock-out expires.
For more information on locked-out users, see Top user lockouts widget, Lockouts, and User management.
RADIUS sessions
You can monitor RADIUS activity and log out users.
To view currently active RADIUS accounting sessions, go to Monitor > Authentication > RADIUS Sessions.
The page shows the user's name, type, IP address, MAC address, and RADIUS client, duration, and data usage columns. More specifically, Accounting-Start Interim-Update packets are received. A user session is removed from this table after the Accounting-Stop packet is received, or the session doesn't receive any RADIUS accounting packets before the timeout period expires.
To log out a user as an admin, select the user from the table and select Logoff.
There are two pages to view: Active and Cumulative. Select Cumulative to view statistics for user who have a time and/or data usage limit. This information may be accumulated through a succession of RADIUS accounting sessions. A user's stats are removed when explicitly deleted by the administrator (by selecting the user and selecting Delete), or when the user's account itself is deleted.
While administrators can log out users, they can also reset a user's time and/or data usage using Reset Usage.
For more information on user time and data usage limits, see Usage profile.
RADIUS accounting sessions can be configured to timeout after a specific time period has been reached. To do so, see General.
Windows AD
FortiAuthenticator supports multiple Windows AD server forests, as shown below. A maximum of 20 remote LDAP servers with Windows AD enabled can be configured at once. In addition, you can see when the server was last updated, and an option to reset the connection for individual servers.
To view Windows AD server information, go to Monitor > Authentication > Windows AD.
To refresh the connection, select Refresh in the toolbar. The server name, IP address, authentication realm, agent, and connection are shown.
Windows device logins
To view the Windows device logins, go to Monitor > Authentication > Windows Device Logins.
To refresh the list, select Refresh in the toolbar. See Machine authentication for more information.
Learned RADIUS users
Learned RADIUS users are users that have been learned by the FortiAuthenticator after they have authenticated against a remote RADIUS server.
For information on enabling learning RADIUS users, see RADIUS.