Fortinet white logo
Fortinet white logo
7.6.0

User authentication for management network access

User authentication for management network access

Controlling who can access the FortiProxy, and what permission they have, is integral to the security of your network.

Who can access the FortiProxy

Users can log in to the FortiProxy by authenticating locally with the FortiProxy, or with a remote access server that is integrated with the FortiProxy, such as LDAP or RADIUS servers.

For local accounts on the FortiProxy, define a password policy to ensure a minimum complexity level.

Remote authentication servers enforce their own password policies. They also provide more configuration options. For example, you can use pre-defined security groups to enable access to a group of users. If an administrator's access needs to be removed, when their account is disabled in the remote access server, they are no longer able to log in to the FortiProxy.

Do not use shared accounts to access the FortiProxy. Shared accounts are more likely to be compromised, are more difficult to maintain as password updates must be disseminated to all users, and make it impossible to audit access to the FortiProxy.

In addition to accounts for GUI and CLI administration, the FortiProxy can be managed with API calls by API users who are required to generate authorization tokens for REST API messages. If the FortiProxy is managed by running scripts over SSH, authenticate users using certificates to avoid storing and maintaining passwords in the application that is making the SSH connection.

What can administrators access

The features that an administrator can access should be limited to the scope of that administrator's work to reduce possible attack vectors. The access profile tied to the user account defines the areas on the FortiProxy that the administrator can access, and what they can do in those areas. The list of users with access should be audited regularly to ensure that it is current.

How can users access the FortiProxy

Limit access to the FortiProxy to a management interface on a management network. Trusted hosts can also be used to specify the IP addresses or subnets that can log in to the FortiProxy.

When authenticating to the FortiProxy, implement multi-factor authentication (MFA). This makes it significantly more difficult for an attacker to gain access to the FortiProxy.

User authentication for management network access

User authentication for management network access

Controlling who can access the FortiProxy, and what permission they have, is integral to the security of your network.

Who can access the FortiProxy

Users can log in to the FortiProxy by authenticating locally with the FortiProxy, or with a remote access server that is integrated with the FortiProxy, such as LDAP or RADIUS servers.

For local accounts on the FortiProxy, define a password policy to ensure a minimum complexity level.

Remote authentication servers enforce their own password policies. They also provide more configuration options. For example, you can use pre-defined security groups to enable access to a group of users. If an administrator's access needs to be removed, when their account is disabled in the remote access server, they are no longer able to log in to the FortiProxy.

Do not use shared accounts to access the FortiProxy. Shared accounts are more likely to be compromised, are more difficult to maintain as password updates must be disseminated to all users, and make it impossible to audit access to the FortiProxy.

In addition to accounts for GUI and CLI administration, the FortiProxy can be managed with API calls by API users who are required to generate authorization tokens for REST API messages. If the FortiProxy is managed by running scripts over SSH, authenticate users using certificates to avoid storing and maintaining passwords in the application that is making the SSH connection.

What can administrators access

The features that an administrator can access should be limited to the scope of that administrator's work to reduce possible attack vectors. The access profile tied to the user account defines the areas on the FortiProxy that the administrator can access, and what they can do in those areas. The list of users with access should be audited regularly to ensure that it is current.

How can users access the FortiProxy

Limit access to the FortiProxy to a management interface on a management network. Trusted hosts can also be used to specify the IP addresses or subnets that can log in to the FortiProxy.

When authenticating to the FortiProxy, implement multi-factor authentication (MFA). This makes it significantly more difficult for an attacker to gain access to the FortiProxy.