Known issues
This section lists the known issues of this release, but is not a complete list. For inquires about a particular bug, please visit the Fortinet Support website.
Bug ID |
Description |
---|---|
783685 |
"Obtained access token from Azure" takes too much time to process. |
758516 |
FortiAuthenticator HA: cluster out of sync if the custom RADIUS dictionary is uploaded, auth breaks. |
785585 |
HA load balancing anomaly for the registered captive portal user. |
755752 |
Power supplies show voltage input fault on both CLI and GUI. |
773009 |
FortiAuthenticator does not expand disk properly - system status shows old size, expand-partition shows new size. |
769183 |
FortiAuthenticator VMs need greater resiliency / improved recovery when connectivity lost to the remote data drives. |
787013 |
Changing the username attribute will cause the remote sync rule to remove existing remote users and eventually re-import them. |
780611 |
Oauth Token API returns error when calling API /oauth/token/ with FortiToken Cloud user, but FortiToken Cloud had sent the push to FortiToken Mobile. |
785634 |
Remote user without any FIDO keys for a FIDO enabled portal is unable to change password. |
785164 |
Remote admin unable to create self-service portal security question. |
777392 |
FortiAuthenticator displays entire LDAP tree when testing filter in remote user sync rule, can freeze GUI. |
781506 |
High memory consumption on unused FortiAuthenticator-VM. |
773131 |
FortiAuthenticator-3000F: HW Monitor PSU widget supports PSU placed in top/bottom orientation. |
779771 |
500 internal error shows when editing an LDAP entry. |
782799 |
FortiToken Cloud manual sync timeouts when user > 1000, but actually users are synced. |
783765 |
SAML requests in form of POST with bindings will result in 403 error on FortiAuthenticator. |
775006 |
Occasionally, multiple SMS are received after LDAP user import instead of just one. |
779796 |
SAML IDP proxy for Azure is not working with the current Azure Portal. |
566145 |
Usage Profile "TIME USAGE=Time used" is not triggering COA or disconnect request to FortiGate. |
643810 |
CLI restore-admin command needs improvement. |
749422 |
Rest API script is unable to modify the user info when yubikey is assigned. |
775542 |
Admin logon with 2FA gets "Access denied" before typing the token, auth OK. |
655350 |
The lockout policy does not appear to apply to username/token submissions to the /auth API endpoint. |
757460 |
Enable Django auto-translation for any end user pages. |
750134 |
LDAP server cannot export admin users from local user base. |
775083 |
FortiAuthenticator FSSO detects FortiAuthenticator domain-join as login event, resolves workstation name to 127.0.0.1 and forwards that login. |
646299 |
Nutanix AHV KVM based Hypervisor- upgrading FortiAuthenticator from 6.0.4 to 6.1.x fails and hangs on "Waiting for Database". |
637028 |
SSL connection failed in case of certificate expired issue is not explicit enough. |
638374 |
SCEP - Encryption/hash compatibility with clients. |
676532 |
When FortiAuthenticator has RADIUS client set as subnet, RADIUS accounting disconnect messages are not sent. |
773083 |
Enable/disable FortiToken Cloud push notification button shuts down all the authentication methods. |
770593 |
Minimize the use of CBC ciphersuites. |
767745 |
SNMP facSysCpuUsage returns wrong type. |
767935 |
A-P cluster forms when configured from the GUI, it does not when from CLI without a restart. |
751108 |
FortiAuthenticator does not support admin OIDs from FORTINET-CORE-MIB properly. |
792555 |
After upgrading to FortiAuthenticator 6.4.2, administrators cannot log into admin GUI unless realm configured for legacy self service portal. Workaround: To avoid any login issues for administrators, ensure the local and remote realms with administrators are in the Legacy Self-Service Portal And OAuth Access Control Settings pane in System > Administration > System Access before upgrading the FortiAuthenticator firmware from 6.4.1 and earlier. |