| Description | This article describes how to handle a scenario where SAML SSO Authentication is configured for SSL VPN and the login page does not load. Instead, the page displays the '400 Bad Request' error. |
| Scope | FortiOS 7.4. |
| Solution |
FortiGate is configured to use SAML server for authentication and SSL VPN contains User Groups that are mapped to this SAML server. When trying to log in to the SSL VPN through FortiClient, the internal browser page on the FortiClient does not load. Instead, the following error is observed:
Troubleshooting steps to verify and isolate the point of fault:
diagnose vpn ssl saml-metadata "SAML Server Name"
diagnose vpn ssl saml-metadata "TEST_PROD_SAML" stat('/dev/cmdb/.hidden/sslvpn/tmp/1-TEST_PROD_SAML-sp-meta.xml') failed: No such file or directory
diagnose debug console timestamp enable diagnose debug application sslvpnd -1 diagnose debug enable
In the debug output, the following error is observed:
VPNFortigate (global) # [8543:VDOM-VPN:0]sslvpn_bind_udp_port:522 port 8900 vfid 1 err=98:Address already in use
diagnose sys udpsock | grep 8900
VPNFortigate (global) # diagnose sys udpsock | grep 8900
fnsysctl killall ipsengine
Note: Only perform kill actions during maintenance windows to avoid additional downtime.
VPNFortigate (VDOM-VPN) # diagnose vpn ssl saml-metadata "TEST_PROD_SAML"
Resolution: After the port conflict is fixed, the SAML SSO login page loads on the internal browser on the FortiClient. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.