Genel, Güvenlik
Fortigate LDAP Authentication

Fortigate LDAP Authentication

Merhaba arkadaşlar,

Bugün Fortigate 5.47 build de LDAP Authentication nasıl yapılır onu anlatacağım. Adımları kısa tutup detaylara ağırlık vereğim.

Menü den User & Device > LDAP Servers tabına geliyoruz. Ve Create New diyerek üstteki ekrana ulaşıyoruz. Bu ekranı alttaki gibi dolduruyorum.

Şimdi burada gördüğünüz gibi bilgilerimizi doldurduk. Burada önemli olan tek nokta Common Name İdentifier I değiştirmemiz. Default ta CN geliyor biz ad deki kullanıcı adımızı alması için değeri görseldeki gibi değiştirdik. Ok diyip kaydediyoruz.

Tüm ayarları kaydettikten sonra görebiliyoruz. Ve şimdi LDAP tan bir kullanıcı oluşturuyoruz.

LDAP User I seçiyoruz.

Choose Existing diyip oluşturduğumuz LDAP Server I seçiyoruz. Create New diyerek yeni bir ldap server eklersiniz.

Gördüğünüz gibi test kullanıcımız burda. Üzerine 1 kere tıklayıp Add Selected diyoruz ve Create dediğimiz anda kullanıcımız oluşuyor.

Buraya kadar değineceğim bir detay yoktu, şimdi test edeceğiz ama test için logout olup ban yiyene kadar denemeyeceğiz J

diagnose test authserver ldap deneme test Aa123456

Komutta sarı ile işaretlediğimiz alanlar sırasıyla kurduğumuz LDAP Server Name – SAM – Password

Bunlardan öncesi zaten ana komutları olduğu için TAB yaparak da getirebilirsiniz.

NOT : LDAP dan gelen kullanıcıları admin olarak ekleyemezsiniz.

Share this Story

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

The Hacker News

  • New Chrome 0-day Under Active Attacks – Update Your Browser Now
    by [email protected] (Swati Khandelwal) on 21 Ekim 2020 at 16:27

    Attention readers, if you are using Google Chrome browser on your Windows, Mac, or Linux computers, you need to update your web browsing software immediately to the latest version Google released earlier today. Google released Chrome version 86.0.4240.111 today to patch several security high-severity issues, including a zero-day vulnerability that has been exploited in the wild by attackers to […]

  • Popular Mobile Browsers Found Vulnerable To Address Bar Spoofing Attacks
    by [email protected] (Ravie Lakshmanan) on 21 Ekim 2020 at 07:12

    Graphic for illustration Cybersecurity researchers on Tuesday disclosed details about an address bar spoofing vulnerability affecting multiple mobile browsers, such as Apple Safari and Opera Touch, leaving the door open for spear-phishing attacks and delivering malware. Other impacted browsers include UCWeb, Yandex Browser, Bolt Browser, and RITS Browser. The flaws were discovered by Pakistan […]

  • Windows GravityRAT Malware Now Also Targets macOS and Android Devices
    by [email protected] (Ravie Lakshmanan) on 20 Ekim 2020 at 14:02

    A Windows-based remote access Trojan believed to be designed by Pakistani hacker groups to infiltrate computers and steal users' data has resurfaced after a two-year span with retooled capabilities to target Android and macOS devices. According to cybersecurity firm Kaspersky, the malware — dubbed "GravityRAT" — now masquerades as legitimate Android and macOS apps to capture device data, contact […]

  • Download Ultimate 'Security for Management' Presentation Template
    by [email protected] (The Hacker News) on 20 Ekim 2020 at 13:41

    There is a person in every organization that is the direct owner of breach protection. His or her task is to oversee and govern the process of design, build, maintain, and continuously enhance the security level of the organization. Title-wise, this person is most often either the CIO, CISO, or Directory of IT. For convenience, we'll refer to this individual as the CISO. This person is t […]

  • U.S. Charges 6 Russian Intelligence Officers Over Destructive Cyberattacks
    by [email protected] (Ravie Lakshmanan) on 20 Ekim 2020 at 06:04

    The US government on Monday formally charged six Russian intelligence officers for carrying out destructive malware attacks with an aim to disrupt and destabilize other nations and cause monetary losses. The individuals, who work for Unit 74455 of the Russian Main Intelligence Directorate (GRU), have been accused of perpetrating the "most disruptive and destructive series of computer attacks […]