Last updated on July 7, 2025
Multi-Factor (MFA) and Two-Factor Authentication (2FA) for Fortinet FortiGate SSL VPN using FortiClient VPN or a web browser
Last updated on July 7, 2025
Multi-Factor Authentication (MFA) for Fortinet FortiGate SSL VPN adds an extra layer of security by requiring two forms of authentication. First, users must enter their Active Directory or RADIUS username and password. After this, they must complete a secondary authentication step using a supported method, such as a Mobile Push or Email Link. Once both steps are completed, access to the VPN is granted. Enabling MFA enhances security and helps prevent unauthorized access by malicious actors using stolen credentials.
Rublon introduces Multi-Factor Authentication in a number of ways.
Ensure you have properly configured Fortinet FortiGate SSL VPN VPN.
Ensure that you have properly set up your authentication source, that is an external Identity Provider (IdP) like FreeRADIUS, FreeIPA, OpenLDAP, or Microsoft Active Directory.
Depending on your preference, you can integrate Rublon MFA with Fortinet FortiGate via RADIUS or LDAP protocol.
Integrate Fortinet FortiGate SSL VPN VPN with Rublon to introduce Multi-Factor Authentication (MFA) to your logins. You have to install and configure Rublon Authentication Proxy before configuring Rublon MFA for Fortinet FortiGate SSL VPN VPN using RADIUS.
Integrate Fortinet FortiGate SSL VPN VPN with Rublon to introduce Multi-Factor Authentication (MFA) to your logins. You have to install and configure Rublon Authentication Proxy before configuring Rublon MFA for Fortinet FortiGate SSL VPN VPN using LDAP(S).
If you encounter any issues with your Rublon integration, please contact Rublon Support.