Description | This article describes how to use namespace while configuring SAML between Azure(Idp) and Fortigate(SP) |
Scope | FortGate. |
Solution |
In some cases, namespaces are configured by default for username and group claims on Azure for SAML configuration. While configuring attributes (username and group) on Fortigate for SAML configuration, make sure to check the attributes and claims first on Azure. If the username and group claims on Azure have a namespace in them by default, it is necessary to either use the same namespace ending it with the name of the claim configured on Azure and copy it on FortiGate as shown below or remove the namespace for that particular attribute from Azure.
For example:
Note: if the namespace is not required, remove it from Azure and simply use the name of the username claims as shown above.
Related articles: Technical Tip: Create SSL VPN with Azure SAML SSO Authentication, optional multiple SSL VPN RealmsTechnical Tip: Configuring SAML SSO login for FortiGate administrators with Entra ID acting as SAML ... |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.