FortiAuthenticator 4.0 Release Notes
FortiAuthenticator 4.0 Release Notes
0
Release Notes
FortiAuthenticator 4.0 Release Notes
July 30, 2015
Revision 2
Copyright 2015 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, and FortiGuard are
registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be trademarks
of Fortinet. All other product or company names may be trademarks of their respective owners.
Performance metrics contained herein were attained in internal lab tests under ideal conditions,
and performance may vary. Network variables, different network environments and other
conditions may affect performance results. Nothing herein represents any binding commitment
by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the
extent Fortinet enters a binding written contract, signed by Fortinets General Counsel, with a
purchaser that expressly warrants that the identified product will perform according to the
performance metrics herein. For absolute clarity, any such warranty will be limited to
performance in the same ideal conditions as in Fortinets internal lab tests. Fortinet disclaims in
full any guarantees. Fortinet reserves the right to change, modify, transfer, or otherwise revise
this publication without notice, and the most current version of the publication shall be
applicable.
System features
These are features related to general system operation and not a specific functional area.
SNMP enhancements
Several new statistics have been added to SNMP:
facHaCurrentStatus: The current HA status of the FortiAuthenticator
facRadiusProxyInTotal: The total number of RADIUS accounting proxy packets received
facRadiusProxyOutTotal: The total number of RADIUS accounting proxy packets sent
It also adds a new trap facTrapHAStatusChange that is triggered when there is a change in
the HA status of the FortiAuthenticator.
Authentication
Authentication covers all of the explicit authentication options within the FortiAuthenticator
including RADIUS, LDAP, Two-Factor, Tokens, EAP, guest management and user self-service
features.
DC/TS Monitor
A new monitoring page has been added to the GUI under Monitor > SSO to display information
on the Domain Controller (DC) and Terminal Server (TS) agents that are reporting to the
FortiAuthenticator.
API
The REST API allows programatic access to the FortiAuthenticator for integration with third
party applications and business processes.
Back up your configuration before beginning this procedure. Whilst no data loss should occur
if the procedures below are correctly followed, it is recommended a full backup is made
before proceeding and the user will be prompted to do so as part of the upgrade process.
For information on how to back up the FortiAuthenticator configuration, see the
FortiAuthenticator Administration Guide.
Image checksums
To verify the integrity of the firmware file, use a checksum tool to compute the firmware files
MD5 checksum. Compare it with the checksum indicated by Fortinet. If the checksums match,
the file is intact.
MD5 checksums for software releases are available from Fortinet Customer Service & Support:
https://support.fortinet.com
Figure 1: Customer Service & Support image checksum tool
It is recommended that a system backup is taken at this point. Once complete, click Start
Upgrade.
Wait until the unpacking, upgrade and reboot process completes (usually 3-5 minutes), then
refresh the page.
FortiOS support
FortiAuthenticator 4.0 supports the following FortiOS versions:
FortiOS v5.0 Patch Release 12
FortiOS v5.2 Patch Release 4
Other FortiOS versions may function correctly, but may not be supported by Fortinet.
System
Table 1: Resolved Authentication issues
Bug ID Description
HA
Table 2: Resolved Authentication issues
Bug ID Description
Authentication
Bug ID Description
0278779 When machine auth is enabled, RADIUS attributes from specified user
group is not applied
0269371 Agent for MSWindows: Error while trying to add users to the exempt list
on FAC agent 1.2
0274549 Ability to filter users from FSSO before entity into DB (reducing licensing
overhead)
0262454 HTTP/S POST to SMS Gateway encodes credentials in URL not body
0262455
0280991 Agent for MSWindows: Login fails if unable to list group members
Bug ID Description
0269371 Error while trying to add users to the exempt list on FAC agent 1.2
0280991 Login fails if unable to list group members. Change group lookup
method.
FSSO
Table 5: Resolved Authentication issues
Bug ID Description
Bug ID Description
GUI
Table 7: Resolved GUI issues
Bug ID Description
0277728 Requested page does not exist after delete the only EAP entry
0251546 Support upgrade when duplicate user incorrectly exists in user lockout
table
0252346 Error while trying to access GUI logs when large volume of logs
0277173 GUI crashes when trying to read some Microsoft certificate extensions
0258539 Account expiry setting doesn't save at first attempt when creating user
Certificate Authority
Table 8: Resolved Certificate Authority issues
Bug ID Description
0265516 Wildcard enrollment with empty subject should allow signing any CSR
API
Table 9: Resolved Authentication issues
Bug ID Description
0276163 Locked tokens selected for provision via API (and fail)
0275086 Exceeding Failed Auth Attempt via API Limit does not lock user
Bug ID Description
Hypervisor Support VMware ESXi / ESX 4.0, 4.1, 5.0, 5.1 and 5.5
Virtual Machine Form Factor Open Virtualization Format (OVF)
Virtual CPUs Supported 1/8
(Minimum / Maximum)
FortiAuthenticator VM firmware
Fortinet provides FortiAuthenticator VM firmware images in two formats:
.out: Use this image for new and upgrades to physical appliance installations. Upgrades
to existing virtual machine installations are also distributed in this format.
ovf.zip: Use this image for new VM installations. It contains a deployable Open
Virtualization Format (OVF) virtual machine package for initial VMware ESXi installations.
For more information see the FortiAuthenticator product datasheet available on the Fortinet web
site, http://www.fortinet.com/products/fortiauthenticator/index.html
The maximum values in this document are the maximum configurable values and are not a
commitment of performance.
Hardware appliances
The following table describes the maximum values set for the various hardware models.
T
a Model
b
l
e
FortiAuthenticator
FortiAuthenticator
FortiAuthenticator
FortiAuthenticator
FortiAuthenticator
1 Feature
2
:
3000D
1000C
3000B
200D
400C
M
a
x System
i Network Static Routes 50 50 50 50 50
m
u Messages SMTP Servers 20 20 20 20 20
m SMS Gateways 20 20 20 20 20
SNMP Hosts 20 20 20 20 20
v
a Administration SYSLOG Servers 20 20 20 20 20
l User Uploaded Images 25 100 500 1000 2000
u
e Language Files 50 50 50 50 50
s 5 5
0
- 9
HAuthentication
a General Auth Clients (NAS) 50 200 1000 2000 4000
r
d Local User Users 500 2000 10000 20000 40000
1
wManagement (Local + Remote)
a User Radius Attributes 1500 6000 30000 60000 120000
r User Groups 50 200 1000 2000 4000
e
Group Radius Attributes 150 150 600 6000 120000
.
FortiTokens 1000 4000 20000 40000 80000
VM appliances
The FortiAuthenticator-VM Appliance is licensed based on the total number of users and
licensed on a stacking basis. All installations must start with a FortiAuthenticator VM-Base
license and users can be stacked with upgrade licenses in blocks of 100, 1,000, 10,000 and
licensed User VM
Unlicensed VM
Example 5000
Feature
System
Network Static Routes 2 50 50 50
Messaging SMTP Servers 2 20 20 20
SMS Gateways 2 20 20 20
SNMP Hosts 2 20 20 20
Administration SYSLOG Servers 2 20 20 20
User Uploaded Images 5 Users / 20 5 100
Language Files 5 50 50 50
Authentication
General Auth Clients (NAS) 3 Users / 10 10 500
User Management Users 5 *********** 100 5000
(Local + Remote)*
User Radius Attributes 15 U sers x 3 300 15000
User Groups 3 Users / 10 10 500
Group Radius Attributes 9 Users x 3 300 15000
FortiTokens 10 Users x 2 200 10000
FortiToken Mobile Licenses 3 200 200 200
(Stacked)
LDAP Entries 20 Users x 2 200 10000
Device (MAC-based Auth.) 1 Users / 10 10 500
Remote LDAP Servers 4 Users / 25 4 200
Remote LDAP Sync Rule 1 Users / 20 5 250
Remote LDAP User Radius 15 Users x 3 300 15000
Attributes
SSO & Dynamic Policies
SSO SSO Users 5 Users 100 5000