All posts

How to Configure Caddy FortiGate for Secure, Repeatable Access

Picture this: your team just deployed a new internal dashboard, and everyone wants in. You need HTTPS, authentication, and clear policy controls. You could spend days wrangling configs, or you could pair Caddy with FortiGate and watch identity management click into place like a puzzle piece that finally fits. Caddy handles web serving and TLS automation with almost suspicious ease. FortiGate enforces network rules and acts as a traffic sentry. Together, Caddy FortiGate becomes a compact but pow

Free White Paper

VNC Secure Access + Customer Support Access to Production: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

Picture this: your team just deployed a new internal dashboard, and everyone wants in. You need HTTPS, authentication, and clear policy controls. You could spend days wrangling configs, or you could pair Caddy with FortiGate and watch identity management click into place like a puzzle piece that finally fits.

Caddy handles web serving and TLS automation with almost suspicious ease. FortiGate enforces network rules and acts as a traffic sentry. Together, Caddy FortiGate becomes a compact but powerful gateway for controlled access. Caddy takes care of certificates, redirects, and reverse proxy logic, while FortiGate secures the edges with inspection, segmentation, and user-based policy enforcement.

The integration starts with trust. FortiGate authenticates user sessions—often through SAML or OIDC—and applies dynamic policies. Caddy receives that trusted session, routes the request, and auto-renews the TLS certificates that make browsers happy. No expired certificates, no weird redirect loops. Just identity-aware traffic piped through a security layer that won’t let anything slip.

In most setups, admins point FortiGate’s policy rules to a Caddy endpoint instead of a raw backend IP. Caddy validates upstream identity claims, hides internal services, and logs every touchpoint. FortiGate filters and inspects that same flow for compliance. Add in simple HTTP header passing for identity context, and you have end-to-end visibility without writing a thousand lines of NGINX directives.

Best practices that matter:

Continue reading? Get the full guide.

VNC Secure Access + Customer Support Access to Production: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.
  • Use OIDC integration with FortiGate for consistent identity mapping across cloud and on-prem.
  • Keep Caddy’s config minimal but audit-friendly—humans still need to read it.
  • Rotate secrets at the identity layer, not just network tokens.
  • Log authentication and authorization separately to simplify audits for SOC 2 or ISO 27001.

Practical benefits:

  • Single source of truth for user access.
  • Automated HTTPS without manual renewals.
  • Faster onboarding for new developers through unified identity.
  • Clearer incident forensics—every handshake is documented.
  • Predictable behavior across environments, from staging to production.

For developers, this setup means fewer Slack pings asking for “the right URL.” A new service can live behind Caddy in minutes, validated by FortiGate’s policies without ops intervention. Less waiting, fewer mistakes, more velocity. Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically, giving security engineers sleep and developers speed.

How do I connect Caddy with FortiGate?
Point your FortiGate Virtual IP to Caddy’s listening address, enable TLS handling in Caddy, and delegate user authentication through FortiGate’s IdP integration. The result is identity-driven request flows from the first byte to the backend.

What makes Caddy FortiGate worth using?
It balances simplicity with control. Caddy brings modern HTTPS defaults, FortiGate enforces hardened policies, and together they remove the classic tension between security and developer agility.

When AI-powered infrastructure agents start touching protected endpoints, identity becomes even more critical. AI tools need guardrails too, and a Caddy FortiGate pipeline ensures that requests, whether human or machine, meet the same security baseline.

Secure, repeatable access is never an accident. With Caddy and FortiGate, it becomes standard practice.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts