FortiNet FortiGate- RADUIS Configuration- RSA Ready Implementation Guide
This section describes how to integrate FortiGate with RSA Authentication Manager using RADIUS.
Configure RSA Authentication Manager
Perform these steps to configure RSA Authentication Manager using RADIUS.
Procedure
- Sign in to Security Console.
- Go to RADIUS > RADIUS Servers and make a note of the IP address of the selected RADIUS server. This will be later used in FortiGate configuration.
- Navigate to RADIUS > RADIUS Clients > Add New.
- On the Add RADIUS Client page, enter the following details:
-
- Client Name: Enter a descriptive name for the Radius client.
- IPv4 Address: Enter the IP address of the Radius client (FortiGate).
- Make / Model: Select Standard Radius from the drop-down menu.
- Shared Secret: Create and enter a secure shared secret. This secret will be used for secure communication between the Radius client and the Radius server. This will be the same shared secret that will be used in FortiGate configuration.
- Click on Save & Create Associated RSA Agent.
- On the Add New Authentication Agent page, click Save, then confirm by clicking Yes, Save Agent.
Notes
- RSA Authentication Manager RADIUS server listens on ports UDP 1645 and UDP 1812.
- The relationship of agent host record to RADIUS client in the Authentication Manager can 1 to 1, 1 to many or 1 to all (global).
- Shared Secret must be an alphanumeric string between 1 and 31 characters in length and is case-sensitive
Configure FortiGate
Perform these steps to configure FortiGate as a RADIUS client to RSA Authentication Manager.
Procedure
- On the Fortinet FortiGate web interface, from the left pane, navigate to User & Authentication > RADIUS Servers.
- Create a New RADIUS Server, choose the authentication method from the dropdown list.
- In Primary Server section, fill in the IP address of the RSA Authentication Manager RADIUS Server and the Secret as configured in RSA. Then press Ok.
Configuration complete.
Use Case
- On the security console of RSA Authentication Manager page, add a software token profile by navigating to Authentication > Soft Token Profiles > Add New. For more information on Soft Token Profiles and how to create, visit this article.
- Create a test user in Internal Database of RSA Authentication manager. Navigate to Identity > Users > Add New.
- Assign and distribute the Software Token to the user created in the previous step for testing. For more information on distributing Software Tokens, visit this article.
- Import token to RSA software desktop application.
- On FortiGate page, Navigate to User & Authentication > User Definition and click on the + Create New button to open the Users/Groups Creation Wizard.
- Import the new user to the RSA RADIUS Server created earlier by choosing it from the RADIUS Server dropdown.
- Add the user to the relevant User Group and click Submit.
- Navigate to User & Authentication > RADIUS Servers to Test user credential by clicking the button [Test User Credentials].
Return to FortiNet FortiGate- RSA Ready Implementation Guide
Related Articles
FortiGate Firewall - SAML IDR SSO Configuration Using Admin Access UI - RSA Ready Implementation Guide 23Number of Views Admin UI - Authentication Configuration 7Number of Views FortiGate Firewall - SAML Relying Party Configuration Using Admin Access UI - RSA Ready Implementation Guide 19Number of Views FortiNet FortiGate- RSA Ready Implementation Guide 23Number of Views FortiGate Firewall - SAML My Page SSO Configuration Using SSL VPN - RSA Ready Implementation Guide 18Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?