FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Divya_N
Staff
Staff
Article Id 329402
Description This article describes Admin SSO with FortiAuthenticator as a SAML server with locally created users.
Scope FortiOS.
Solution

To achieve the configuration, refer to the following steps:

 

On FortiAuthenticator(IDP (FortiAuthenticator as SAML server):

  • Enable the SAML IDP and configure the IDP settings.
  • Create local users and add them to the groups.
  • On the FortiAuthenticator admin port enable IDP services.

 

Go to user management, create local users, and add the users to the user groups:

 

FAC users.png

 

Go to Authentication -> SAML IDP -> General and configure the server address which is FortiAuthenticator's management IP and select the user group configured locally under the realms.

 
 

After this step, navigate to SAML IDP -> Service providers.

Configure the SP IP as FortiGates IP, near the IDP prefix select the '+' icon to generate a prefix that will be later used on the FortiGate.

 

Once the prefix is generated configure the user attributes and save, it should be possible to see the IDP URLs and SP settings.

 

FAC 1.png

 

FAC 2.png

 

Enable the IdP services on the admin port.

 

FAC management SSO.png

 

On the FortiGate (SP):

Go to Security Fabric -> Fabric connector -> Security fabric setup -> Select Single sign-on settings, select SP, fill in the IdP details copied from the FortiAuthenticator, and fill in the SP details copied from the FortiGate to FortiAuthenticator.


FGT 4.png

 

For the IdP certificate, export the default server CRT from FortiAuthenticator and upload it to FortiGate as a remote certificate.

Go to Certificate Management -> End entities -> Local Services -> Export certificate and download it.

 

cert.png

 

Once downloaded, on the FortiGate go to System -> Certificates -> Create/import -> Remote and Import the IDP certificate and use it in the IdP settings on the FortiGate.

 

After these steps, log out from FortiGate, it should be possible to see the following page:

 

FGT login.png

 

Select Sign in with Security Fabric, and use the login credentials created on the SAML server (FortiAuthenticator) to log in after the SAML IdP redirection happens, it should be successful to log in, and once logged in it should be possible to see the SSO admin.

 

SAML user login.png

 

SAML overview:

SAML

 

Verify the SAML redirection with the given commands:

 

diagnose debug application httpsd -1
diagnose debug application samld -1
diagnose debug console timestamp enable 
diagnose debug enable
 
To disable the debug run the following command:
 
diagnose debug disable
 
Related article: