profile authentication
Use these commands to configure FortiMail to connect to a remote authentication server. These commands configure all remote authentication methods except LDAP and SSO. For those methods, instead see profile ldap and profile sso.
You can define administrator and user accounts locally (on FortiMail), but often organizations have already defined accounts on a directory server or mail server. To avoid maintaining separate accounts on multiple systems, you may want to reuse accounts on that server. FortiMail. FortiMail supports authentication with remote servers via:
-
SMTP
-
IMAP
-
POP3
-
RADIUS
-
LDAP
-
SSO
|
|
When FortiMail is operating in server mode, SMTP, IMAP, and POP3 authentication are not available. |
|
|
LDAP profiles can configure many more features than just authentication. For details, see profile ldap. SMTP profiles can be used to authenticate SMTP connections, but they can also authenticate email users making webmail (HTTP or HTTPS) or POP3 connections to view their per-recipient quarantine, and when FortiMail authenticates with another SMTP server to deliver email. |
For the general procedure of how to configure authentication for email users, see the FortiMail Administration Guide.
Syntax
config profile authentication smtp
edit <profile_name>
[set comment "<comment_str>"]
set server {<fqdn_str> | <host_ipv4>}
set port <port_int>
set option {ssl secure tls senddomain}
set auth-type {auto | cram-md5 | digest-md5 | login | ntlm | plain}
set try-ldap-mailhost {enable | disable}
config profile authentication imap
edit <profile_name>
[set comment "<comment_str>"]
set server {<fqdn_str> | <host_ipv4>}
set port <port_int>
set option {ssl secure tls senddomain}
set auth-type {auto | cram-md5 | digest-md5 | login | ntlm | plain}
config profile authentication pop3
edit <profile_name>
[set comment "<comment_str>"]
set server {<fqdn_str> | <host_ipv4>}
set port <port_int>
set option {ssl secure tls senddomain}
set auth-type {auto | cram-md5 | digest-md5 | login | ntlm | plain}
config profile authentication radius
edit <profile_name>
[set comment "<comment_str>"]
set server {<fqdn_str> | <host_ipv4>}
set transport-protocol {tls | tcp | udp}
set port <port_int>
set auth-prot {auto | chap | mschap | mschap2 | pap}
set send-domain {enable | disable}
[set nas-ip <FortiMail_ipv4>]
set access-override {enable | disable}
set access-override-attribute <attribute_int>
set access-override-vendor <vendor_int>
set domain-override {enable | disable}
set domain-override-attribute <attribute_int>
set domain-override-vendor <vendor_int>
end
|
Variable |
Description |
Default |
|
Enter the name of the profile. To view a list of existing entries, enter a question mark ( |
|
|
|
Enter the attribute ID of a vendor for remote access permission override. The attribute should hold an access profile name that exists on FortiMail. The default ID is |
6 |
|
|
Enter the vendor’s registered RADIUS ID for remote access permission override. The default ID is 12356, which is Fortinet. |
12356 |
|
|
Enable to override the access profile you specify when you add an administrator with the value of the remote attribute returned from the RADIUS server, if the returned value matches an existing access profile. |
disable |
|
|
Select an authentication method that the RADIUS server supports, either:
|
mschap2 |
|
|
auth-type {auto | cram-md5 | digest-md5 | login | ntlm | plain} |
Select an authentication mechanism. For details, seethe relevant RFCs. This setting is ignored if option {ssl secure tls senddomain} does not include |
auto |
|
Select the name of the certificate authority (CA) certificate that will be used to validate the signature on the RADIUS server's certificate. For details, see system certificate ca. This setting is only available if transport-protocol {tls | tcp | udp} is |
|
|
|
Enter the attribute ID of a vendor for remote domain override. The attribute should hold a domain name that exists on FortiMail. The default ID is |
3 |
|
|
Enter a description or comment. |
|
|
|
Enter the vendor’s registered RADIUS ID for remote domain override. The default ID is |
12356 |
|
|
Enable to override the domain you specify when you add an administrator with the value of the remote attribute returned from the RADIUS server, if the returned value matches an existing protected domain. |
disable |
|
|
Enter the NAS IP address, also known as If you do not enter an IP address, FortiMail uses the IP address of the interface that communicates with the RADIUS server. |
0.0.0.0 |
|
|
If you want to enable any of the following options, enter them in a space-delimited list:
For |
|
|
|
Enter the port number on which the authentication server listens. FortiMail uses IANA standard port numbers by default. See the default port numbers in the FortiMail Administration Guide. |
Varies by type of authentication server. |
|
|
Enter the password for the RADIUS server. |
|
|
|
Enable if the RADIUS server requires both the user name and the domain when authenticating. |
disable |
|
|
Enter the IP address or fully qualified domain name (FQDN) of an authentication server. |
|
|
|
Select the protocol that the authentication server uses, either:
Caution: Do not select UDP or TCP if queries occur over untrusted networks such as the Internet. They are not secure connections, and do not provide encryption nor authentication of the server's identity. Attackers could use this to gain unauthorized access. |
udp |
|
|
Enable if your LDAP server has a mail host entry for the generic user. If you enable this option, FortiMail will query the generic LDAP server first to authenticate email users. If no results are returned, then FortiMail will query the server in server {<fqdn_str> | <host_ipv4>}. |
enable |