


On most recent RPM-based distributions - like Fedora, RedHat Enterprise, and CentOS - you can install these by running (as root): $ yum install gcc make libffi-devel perl zlib-devel diffutils See Protecting Applications for more information about protecting applications in Duo and additional application options.Įnsure that Perl and a compiler toolchain are installed. You'll need this information to complete your setup. Click Protect to get your integration key, secret key, and API hostname.

Click Protect an Application and locate Fortinet FortiGate SSL VPN in the applications list.Log in to the Duo Admin Panel and navigate to Applications.Debian 7 or later (Debian 9+ recommended).Ubuntu 16.04 or later (Ubuntu 18.04+ recommended).Red Hat Enterprise Linux 7 or later (RHEL 8+ recommended).CentOS 7 or later (CentOS 8+ recommended).Windows Server 2012 or later (Server 2016+ recommended).The proxy supports these operating systems: Locate (or set up) a system on which you will install the Duo Authentication Proxy.

This Duo proxy server will receive incoming RADIUS requests from your Fortinet FortiGate SSL VPN, contact your existing local LDAP/AD or RADIUS server to perform primary authentication if necessary, and then contact Duo's cloud service for secondary authentication. To integrate Duo with your Fortinet FortiGate SSL VPN, you will need to install a local Duo proxy service on a machine within your network. You should already have a working primary authentication configuration for your Fortinet FortiGate SSL VPN users before you begin to deploy Duo. You'll need to pre-enroll your users in Duo using one of our available methods before they can log in using this configuration. Before moving on to the deployment steps, it's a good idea to familiarize yourself with Duo administration concepts and features like options for applications, and Duo policy settings and how to apply them.
