Created on
07-31-2023
08:24 AM
Edited on
03-28-2025
06:17 AM
By
Jean-Philippe_P
Description | This article describes how to fix the 'No group info in SAML response' error. |
Scope | FortiGate, and FortiAuthenticator. |
Solution |
The settings below seem to be correct, with the FortiGate SP matching the FortiAuthenticator IDP group attribute.
config user saml edit "faccldfgt" set cert "Fortinet_Factory" set entity-id "https://10.191.19.149:44444/remote/saml/metadata" set single-sign-on-url "https://10.191.19.149:44444/remote/saml/login" set single-logout-url "https://10.191.19.149:44444/remote/saml/logout" set idp-entity-id "http://fac.local/saml-idp/faccldfgt/metadata/" set idp-single-sign-on-url "https://fac.local/saml-idp/faccldfgt/login/" set idp-single-logout-url "https://fac.local/saml-idp/faccldfgt/logout/" set idp-cert "faccldfgt" set user-name "user" set group-name "group" set digest-method sha1 next end
... diag debug cons timestamp enable ... samld_send_common_reply [122]: Attr: 17, 27, magic=ad3cf73b6f7f05a5 ...
Make sure the user and group user attributes match the server type set in the realm.
The correct user attribute is FortiAuthenticator, Group.
...
FortiGate debug should show why this is failing:
samld_send_common_reply [95]: Attr: 10, 22, 'username' 'test'
In this example, the correct and complete group value is CN=Users,CN=Builtin,DC=bogusinc,DC=local not Users as configured on FortiGate.
fortigate (root) # show user group FAC-SAML-LDAP-LAB
Despite having the correct configuration, the auth is still failing with no group info.
config user saml
fortigate (test-vdom) # show user group fac_fgt149.44433_saml
FortiGate debug should show why this is failing:
samld_send_common_reply [95]: Attr: 10, 34, 'user' 'test.user@acmeinc.net'
But in FortiAuthenticator GUI debug group info from Azure/Entra can be seen:
https://<FortiAuthenticatorIp>/debug/gui/
<Attribute Name="http://schemas.microsoft.com/ws/2008/06/identity/claims/groups">
If there is no access to Azure/Entra to configure a group claim 'groups' as the FortiGate is expecting in this example, then the FortiAuthenticator can be instructed to look for another claim to extract and pass on group info to the FortiGate.
In the corresponding SP config on the FortiAuthenticator, add/change the group claim as below and use in the Custom field the group claim received from Azure/Entra:
http://schemas.microsoft.com/ws/2008/06/identity/claims/groups
Now the auth should work; the FortiGate is receiving the group info:
samld_send_common_reply [95]: Attr: 10, 38, 'username' 'test.user@acmeinc.net' |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.