| Description |
This article describes the steps required to configure a SAML Remote Authentication Server. The configuration process includes all necessary actions on both Azure/Entra ID and FortiTrust-ID. |
| Scope |
FortiTrust-ID. |
| Solution |
The following section shows the steps required to configure a SAML Remote Authentication Server on FortiTrust-ID. The configuration is divided into two main parts: the first is performed on Azure/Entra ID, and the second is completed on FortiTrust-ID. After completing both parts, FortiTrust-ID will import users from the SAML server.
Prerequisite:
A directory must exist in Microsoft Azure. If a directory is not available, it can be created by navigating to: Azure Portal → Azure AD → Create a tenant → Microsoft Entra ID / Azure AD B2C.
Identifier (Entity-ID): https://<fortitrust-fqdn>/saml-idp/proxy/<Application-Name>/metadata Reply-URL: https://<fortitrust-fqdn>/saml-idp/proxy/<Application-Name>/saml/?acs Sing on URL: https://<fortitrust-fqdn>/saml-idp/proxy/<Application-Name>/login/ Logout URL: https://<fortitrust-fqdn>/saml-idp/proxy/<Application-Name>/saml/?sls
Files to download:
Leave the other steps as the default. No further modifications are required on the Single-Sign-On end.
Search for Application-Name and make it a part of Directory-Readers by adding assignments.
Go to FortiTrust-ID and navigate to Remote Auth.Servers -> Oauth. Select Create New and fill in the following:
After completing this step, go to Remote Auth. Server -> SAML and Create New.
Note: The name of the server must be the same as the Application_Name. Portal-URL is automatically filled in after creating the name of the Server. For Entity-ID, select the recommended version for Azure IdP. ACS (login) and (logout) URL: Needs to be copied from Azure Saml-Configurations. Under IdP Metadata, import the Federation Metadata XML which was downloaded before. Under Group Membership -> Select Cloud -> Select the Oauth Server that was created.
On FortiTrust-ID, navigate to Authentication -> User Management -> Remote Users -> SAML -> Import.
In the Logs, it will be visible whether the user has been imported successfully without errors.
Another option is to create Remote-Sync-Rules, which allows for automatic user imports based on the configured synchronization frequency. Users imported via SyncRule can be assigned a FortToken Cloud or FortiToken Logo and can be placed into specific groups, depending on the setup and configuration. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.