CyberInsurance is requiring MFA on all remote connections.
We are currently using IPSec VPN for all remote connections.
Aside from Fortitoken, what other MFA options might I have have with IPSec VPN connections? Ideally I would to configure SAML to EntraID and let that handle the MFA, but all the documentation and posts I find are related to configuring that for SSL VPN… which we are not and do not want to use.
Is SAML an option for IPSec VPN and if so, is there a straight-forward guide for configuring it?
Hello SAML and ipsec is not supported on fortigate. For mfa i would suggest like others comments to delegate to a radius server
yes our insurance company required this last year for us - we used Duo - https://duo.com/docs/fortinet
As others mentioned. A radius server that is tied into your identity platform.
We mainly use windows NPS with the Azure extension
Are these user based VPNs?
If so, look at Azure VPN conditional access.
Users get issued a just-in-time short lived certificate from MS at connect time and you can use PKI authentication. MS will grant the certificate only if the user and device meet CA conditions.
You can use a radius proxy like DUO or OKTA which both platforms support MFA. Yes I said OKTA lol, might avoid them with all the talks of OKTA compromises.
SAML for IPsec is not yet ready. SSL-VPN is fully functional.
Take a look at FortiAuthenticator it will really make it simple and add a brick into your ZTNA roadmap that you can later easy leverage
Do you know if that will work with IPSec also?
No one’s mentioned FortiAuthenticator? Great multiuse platform!
By user-based, you mean client VPN vs site to site? Yes, client VPN in that a user initiates the VPN connection to HQ.
HQ has on prem AD and all devices are AD joined, not AAD joined… and I don’t want to go that route currently.
Unless I misunderstood what you are suggesting?
I do love Fortiauthenticator. But in most of our environments it’s easiest and most cost effective to throw an NPS server in and call it a day.
Well I meant, not a device tunnel.
Outbound firewall authentication with Azure AD as a SAML IdP | FortiGate / FortiOS 7.4.1 | Fortinet Document Library
I’ve been reading the docs and stumbled across this the other day. My plan is to use this to authenticate firewall users and then base policy off of this.
Correct - not a device tunnel
Then check out the Azure VPN conditional access docs. It may be what you’re looking for.