Created on
01-04-2024
09:06 PM
Edited on
02-05-2025
07:18 AM
By
Jean-Philippe_P
Description | This article describes how to use namespace while configuring SAML between Azure (Idp) and FortiGate (SP). |
Scope | FortiGate. |
Solution |
In some cases, namespaces are configured by default for username and group claims on Azure for SAML configuration. While configuring attributes (username and group) on Fortigate for SAML configuration, make sure to check the attributes and claims first on Azure.
If the username and group claims on Azure have a namespace in them by default, it is necessary to either use the same namespace ending it with the name of the claim configured on Azure and copy it on FortiGate as shown below or remove the namespace for that particular attribute from Azure.
For example:
Note: If the namespace is not required, remove it from Azure and simply use the name of the username claims as shown above.
Related documents: Technical Tip: Create SSL VPN with Azure SAML SSO Authentication, optional multiple SSL VPN RealmsTechnical Tip: Configuring SAML SSO login for FortiGate administrators with Entra ID acting as SAML ... |