Genel, Güvenlik
Fortigate LDAP Authentication

Fortigate LDAP Authentication

Merhaba arkadaşlar,

Bugün Fortigate 5.47 build de LDAP Authentication nasıl yapılır onu anlatacağım. Adımları kısa tutup detaylara ağırlık vereğim.

Menü den User & Device > LDAP Servers tabına geliyoruz. Ve Create New diyerek üstteki ekrana ulaşıyoruz. Bu ekranı alttaki gibi dolduruyorum.

Şimdi burada gördüğünüz gibi bilgilerimizi doldurduk. Burada önemli olan tek nokta Common Name İdentifier I değiştirmemiz. Default ta CN geliyor biz ad deki kullanıcı adımızı alması için değeri görseldeki gibi değiştirdik. Ok diyip kaydediyoruz.

Tüm ayarları kaydettikten sonra görebiliyoruz. Ve şimdi LDAP tan bir kullanıcı oluşturuyoruz.

LDAP User I seçiyoruz.

Choose Existing diyip oluşturduğumuz LDAP Server I seçiyoruz. Create New diyerek yeni bir ldap server eklersiniz.

Gördüğünüz gibi test kullanıcımız burda. Üzerine 1 kere tıklayıp Add Selected diyoruz ve Create dediğimiz anda kullanıcımız oluşuyor.

Buraya kadar değineceğim bir detay yoktu, şimdi test edeceğiz ama test için logout olup ban yiyene kadar denemeyeceğiz J

diagnose test authserver ldap deneme test Aa123456

Komutta sarı ile işaretlediğimiz alanlar sırasıyla kurduğumuz LDAP Server Name – SAM – Password

Bunlardan öncesi zaten ana komutları olduğu için TAB yaparak da getirebilirsiniz.

NOT : LDAP dan gelen kullanıcıları admin olarak ekleyemezsiniz.

Share this Story

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

The Hacker News

  • Lazarus APT Hackers are now using BMP images to hide RAT malware
    by [email protected] (Ravie Lakshmanan) on 20 Nisan 2021 at 05:33

    A spear-phishing attack operated by a North Korean threat actor targeting its southern counterpart has been found to conceal its malicious code within a bitmap (.BMP) image file to drop a remote access trojan (RAT) capable of stealing sensitive information. Attributing the attack to the Lazarus Group based on similarities to prior tactics adopted by the adversary, researchers from Malwarebytes […]

  • Malware That Spreads Via Xcode Projects Now Targeting Apple's M1-based Macs
    by [email protected] (Ravie Lakshmanan) on 19 Nisan 2021 at 11:58

    A Mac malware campaign targeting Xcode developers has been retooled to add support for Apple's new M1 chips and expand its features to steal confidential information from cryptocurrency apps. XCSSET came into the spotlight in August 2020 after it was found to spread via modified Xcode IDE projects, which, upon the building, were configured to execute the payload. The malware repackages payload […]

  • Passwordless: More Mirage Than Reality
    by [email protected] (The Hacker News) on 19 Nisan 2021 at 11:20

    The concept of "passwordless" authentication has been gaining significant industry and media attention. And for a good reason. Our digital lives are demanding an ever-increasing number of online accounts and services, with security best practices dictating that each requires a strong, unique password in order to ensure data stays safe. Who wouldn't want an easier way? That's the premise behind […]

  • SysAdmin of Billion-Dollar Hacking Group Gets 10-Year Sentence
    by [email protected] (Ravie Lakshmanan) on 17 Nisan 2021 at 09:44

    A high-level manager and systems administrator associated with the FIN7 threat actor has been sentenced to 10 years in prison, the U.S. Department of Justice announced Friday. Fedir Hladyr, a 35-year-old Ukrainian national, is said to have played a crucial role in a criminal scheme that compromised tens of millions of debit and credit cards, in addition to aggregating the stolen information, […]

  • What are the different roles within cybersecurity?
    by [email protected] (The Hacker News) on 17 Nisan 2021 at 09:13

    People talk about the cybersecurity job market like it's a monolith, but there are a number of different roles within cybersecurity, depending not only on your skill level and experience but on what you like to do. In fact, Cybercrime Magazine came up with a list of 50 cybersecurity job titles, while CyberSN, a recruiting organization, came up with its own list of 45 cybersecurity job categories […]