fortigate_-_entra_id_saml_sso
This is an old revision of the document!
Table of Contents
Prerequisites
- Required subscriptions (FortiGate SSL VPN, Entra ID tenant)
- Certificates and basic setup
Add FortiGate SSL VPN in Entra ID
- Enterprise Applications → Add from Gallery → Select FortiGate SSL VPN
Configure Basic SAML Settings in Entra ID
- Identifier (Entity ID)
- Reply URL
- Sign-on URL
- Logout URL
- Attribute & Claim mappings
- Download SAML Signing Certificate
config user saml
edit azure
set cert <FortiGate Let'sEncrypt VPN Server Certificate Name>
set entity-id "https://vpn.my.org:10443/remote/saml/metadata"
set single-sign-on-url "https://vpn.my.org:10443/remote/saml/login"
set single-logout-url "https://vpn.my.org:10443/remote/saml/logout"
set idp-entity-id <Azure AD Identifier>
set idp-single-sign-on-url <Azure Login URL>
set idp-single-logout-url <Azure Logout URL>
set idp-cert <Base64 SAML Certificate Name>
set user-name username
set group-name group
next
end
Create Test User and Security Group in Entra ID
- New user creation
- Assign user to FortiGate SSL VPN app
- Create Security Group (e.g., FortiGateAccess)
- Note Object ID
Upload Certificate to FortiGate
- Import Base64 certificate into FortiGate
- Rename certificate if needed
Configure FortiGate SAML Settings (CLI)
- Define SAML IdP (`config user saml`)
- Map entity-id, single-sign-on-url, logout-url, IdP URLs, certificate, attributes
Configure FortiGate User Group
- Create group (`config user group`)
- Match against Azure Security Group Object ID
Configure SSL VPN Portals and Firewall Policy
- Create VPN portal(s)
- Apply firewall rules for SAML group
Optional: Multiple SSL VPN Realms
- Enable SSL-VPN Realms feature
- Create multiple realms (e.g., FullTunnel, SplitTunnel)
- Configure portals and policies per realm
FortiClient Setup (Optional)
- Configure FortiClient for SSL VPN with SAML SSO
Testing and Validation
- Test SSO via Azure “Test” button
- Direct login to FortiGate VPN portal
- Use My Apps tile
- Debugging commands (`diagnose debug application samld`)
Troubleshooting Notes
- Certificate re-download after FQDN changes
- Signature verification requirements in FortiOS 7.2.12 / 7.4.9 / 7.6.4
- Common errors (e.g., “Signature element not found”)
fortigate_-_entra_id_saml_sso.1765574963.txt.gz · Last modified: 2025/12/12 21:29 by oso
