FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
herzogk
Staff & Editor
Staff & Editor
Article Id 412823
Description This article describes how to configure authentik as a SAML provider for FortiOS admin users.
Scope FortiOS 7.2.x, 7.4.x, and 7.6.x.
Solution

Authentik is a self-hosted, open source identity provider that can be configured as a SAML identify provider.

Configure the following in order to connect it with FortOS.

 

Authentik Configuration:

 

Begin by logging in as an administrator in authentik.

 

  1. Create a Custom SAML Property Mapping in authentik.
  • Navigate to Customization -> Property Mappings -> Create.
  • Select SAML Provider Property Mapping.
  • Use the following settings:
    • Name: fgt.username
    • SAML Attribute Name: username
    • Expression: return request.user.email


Property mapping example.Property mapping example.

  1. Create the application and provider pair.

Provider Settings:

 

 

Provider example.Provider example.


Application Settings:

  • Name: fortigate_app
  • Slug: fortigate_admin
  • Provider: Select Provider from the above.

After creation, configure the required user/group bindings.

 

Application example.Application example.

 

FortiGate Configuration:

 

Begin by logging in as a current admin to the FortiGate.

Navigate to Security Fabric -> Fabric Connectors -> Security Fabric Setup -> Single Sign-On Settings.

 

Note: In the sign-on and logout URLs, the slug 'fortigate_admin' from above is configured.

 

FortiGate SSO Example.FortiGate SSO Example.

 

After configuration is complete, log out and log back in with the SAML identity to confirm that it is working as expected.

A new SSO entry will be listed under System -> Administrators.

 

Newly created SSO adminNewly created SSO admin

Contributors