Created on 11-24-2021 06:03 AM Edited on 01-09-2025 08:00 AM By Stephen_G
Description | This article describes how to troubleshoot SAML authentication. |
Scope | FortiGate. |
Solution |
A situation may occur in which the SAML for the SSL VPN/Admin access to GUI is configured correctly according to the Fortinet documentation, but the authentication is still unsuccessful.
The proper approach in such a case would be to run the debug for the samld (process responsible for the SAML authentication).
diag debug reset
diag debug console timestamp en
diag debug application samld -1
diag debug enable
Disable debug using the following commands:
diag debug application samld 0
diag debug reset Note:
Before running the commands below, make sure to download the console output to a file.
Follow this article for instructions on how to capture the output in the text file with PuTTY:
Technical Tip: How to create a log file of a session using PuTTY
Failed to process response message. ret=440(The profile cannot verify a signature on the message)
To resolve this scenario:
If the issue was related to certificate. After applying the above changes, the authentication now should be successful.
Note: For MFA authentication, verify the remote authentication timeout value. The default remote authentication timeout value is 5 seconds. To increase the timeout value for MFA, use the following commands:
config system global set remoteauthtimeout 60 end
To collect the SAML logs from the user browser, use SAML extensions:
Note: Each FortiGate requires a unique Assertion Consumer Service (ACS) URL (e.g., https://<local-ip>:1003/remote/saml/login), which must match the registered URL in Azure AD. Since each FortiGate has a different IP, using a single SAML instance for multiple FortiGates would fail to meet this strict URL binding requirement, leading to authentication failures. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.