Created on
02-13-2022
01:30 AM
Edited on
07-15-2025
11:18 AM
By
Stephen_G
Description | This article describes the steps how to configure SSL VPN with realms followed by the SAML authentication. |
Scope | FortiGate |
Solution |
An example SSL VPN configuration with realms (example port 4443 was chosen):
config vpn ssl setting set groups "Users" end
config user saml set entity-id "https://<FortiGate IP/FQDN:4443>/remote/saml/metadata/" set single-sign-on-url "https: //<FortiGate IP/FQDN:4443>/remote/saml/login/" set single-logout-url "https: //<FortiGate IP/FQDN:4443>/remote/saml/logout/" set idp-cert <This certificate will be provided from the IDP side> set user-name "Username" set group-name "Groupname" end
When accessing SSL VPN Web mode or FortiClient tunnel mode, the link will be similar to the following:
https://<FortiGate IP/FQDN:4443>/the_realm_name
Example of configured link for Web-Mode or FortiClient tunnel mode:
https://dragon-armor.grakov.lab:4443/realm_1 Example entry on the FortiClient, the 'Remote Gateway' setting:
https://dragon-armor.grakov.lab:4443/realm_1
On 'config user saml', it is not necessary to define the realm for the SP side, and configuration as shown below can be used for both scenarios with and without the realms.
config user saml set entity-id "https: //<FortiGate IP/FQDN:4443>/remote/saml/metadata/" set single-sign-on-url "https: //<FortiGate IP/FQDN:4443>/remote/saml/login" set single-logout-url "https: //<FortiGate IP/FQDN:4443>/remote/saml/logout" set idp-cert <This certificate will be provided from the IDP side> set user-name "Username" set group-name "Groupname" end |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.