Skip to Content

Understand why NTP is important for FortiAuthenticator to join Microsoft LDAP Active Directory

This article explains the reason why the correct NTP configuration is important when FortiAuthenticator wants to join Microsoft Active Directory.

Scope

FortiAuthenticator.

Solution

The ‘time skew’ or ‘time synchronization’ is a crucial aspect when joining a computer to an Active Directory (AD) domain, especially for Microsoft LDAP.

Microsoft LDAP will be mainly using Kerberos V5 which is highly sensitive to the timestamp. It is a part of the security to prevent a ‘replay attack’ and reject the authentication request if the timestamp is not within the tolerance value configured.

By default, Microsoft LDAP only accepts and tolerates a maximum of 5 minutes in differences. For more information, refer to the following link:

Maximum tolerance for computer clock synchronization

To avoid FortiAuthenticator failing to join Microsoft Active Directory, the clocks of the FortiAuthenticator and the domain controller need to be in sync as much as possible.