| Description |
This article describes a side effect of a new feature, 'Support CORS protocol in explicit web proxy when using session-based, cookie-enabled, and captive portal-enabled SAML authentication', introduced in FortiOS v7.0.6 and v7.2.1.
This feature may appear to allow communication via an unexpected policy showing no authenticated user information in the traffic logs. This unexpected policy would be the first one matching the SRC_IP, DST_IP, and service, while the authorization criteria will be omitted.
When troubleshooting the communication using the following diagnostic commands:
diagnose debug reset
The following messages will appear in the output:
[V]2025-01-13 14:10:45.729232 [p:274][s:1755009540][r:4497] wad_http_parse_auth_cookie :1306 cookie_parsed=0 strip=1 pid=274 |
| Scope | FortiGate, explicit proxy with SAML authentication. |
| Solution |
To control this traffic, build the proxy policy using the following address object:
config firewall proxy-address
config firewall proxy-policy
And place this rule at the top of the proxy policies.
Related document: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.