| Description |
This article discuss a scenario where Forti client is using auto connect feature as in Save password, auto connect, and always up with SAML authentication. The WAN interface of the FortiGate is not configured with a public IP and a NAT pool has been used to send traffic out.
Based on Technical Tip: 'set auth-url' under 'config user saml' has been removed and replaced with 'config us..., the 'set auth-url' command was taken off from 'config user saml' configuration and a new configuration 'config user external-identity-provider' has been put in place after v7.2.8.
The main function of the 'set auth-url' is to specify the URL for the SAML Identity Provider (IdP) authentication endpoint. This URL is where the FortiGate will redirect users to authenticate when they attempt to log in using SAML Single Sign-On (SSO). |
| Scope | FortiGate v7.2.8 and above. |
| Solution |
As mentioned in the above description SSL VPN auto-connect feature with SAML authentication fails between 40% and 50%. In this scenario, WAN IP is not a public IP but a NAT IP pool is being used to send traffic out to the internet.
Based on the Traffic debugs and session table, it was observed that the SAML traffic generated to access the MS Azure Entra ID is leaving the FortiGate without being NAT.
Refer to the below artifacts:
session info: proto=6 proto_state=02 duration=0 expire=9 timeout=3600 flags=00000000 socktype=0 sockport=0 av_idx=0 use=3
Note: 20.190.177.17 is Microsoft Azure IP.
As the solution, this internally generated traffic from FortiGate has to be sourced with a public IP. Hence it is required to define the source IP as the public IP of the NAT IP Pool. The Configuration should look as below:
config user external-identity-provider |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.