


If you will set up a new Duo server, locate (or set up) a system to host the Duo Authentication Proxy installation. However, there are some cases where it might make sense for you to deploy a new proxy server for a new application, like if you want to co-locate the Duo proxy with the application it will protect in the same data center. You don't have to set up a new Authentication Proxy server for each application you create.

If you are already running a Duo Authentication Proxy server in your environment, you can use that existing host for additional applications, appending the new configuration sections to the current config. This Duo proxy server will receive incoming RADIUS requests from your Fortinet FortiGate SSL VPN, contact your existing local LDAP/AD or RADIUS server to perform primary authentication if necessary, and then contact Duo's cloud service for secondary authentication. To integrate Duo with your Fortinet FortiGate SSL VPN, you will need to install a local Duo proxy service on a machine within your network. You should already have a working primary authentication configuration for your Fortinet FortiGate SSL VPN users before you begin to deploy Duo. You'll need to pre-enroll your users in Duo using one of our available methods before they can log in using this configuration. Read the enrollment documentation to learn more.īefore moving on to the deployment steps, it's a good idea to familiarize yourself with Duo administration concepts and features like options for applications, and Duo policy settings and how to apply them. You'll need to create your users in Duo ahead of time using one of our other enrollment methods, like directory sync or CSV import.

This configuration doesn't support inline self-service enrollment. Once configured, Duo sends your users an automatic authentication request via Duo Push notification to a mobile device or phone call after successful primary login. If you are already running a Duo Authentication Proxy server in your environment, you can generally use that existing host for additional applications, appending the new configuration sections to the current config. This Duo proxy server also acts as a RADIUS server - there's usually no need to deploy a separate additional RADIUS server to use Duo. To integrate Duo with your Fortinet FortiGate SSL VPN, you will need to install a local proxy service on a machine within your network. Duo integrates with your Fortinet FortiGate SSL VPN to add two-factor authentication to FortiClient VPN access.
