Description | This article describes how to use SAML outbound authentication for a user-based NAC policy to assign client devices to a VLAN on a FortiGate managing FortiSwitches. |
Scope | FortiOS 6.4 and above. |
Solution |
There are existing articles and documents for outbound authentication using SAML. For more information or instructions on this topic, refer to the following resources:
This particular case will make use of Microsoft Entra ID as the SAML IDP and complete the configuration in the following steps.
config user saml next end
config user group edit "NAC_Access_SAML" set server-name "Entra-ID-SAML-Onbrd-vlan" set group-name "test-group-object-id" next end next end
Note: The first policy (and the second, in this case) should be made exempt from the captive portal as they are required to complete the authentication process. Also, the nac_segment VLAN must be added to the third policy to complete the redirection to the original request after authentication is done. Captive portal exemption can be done in the CLI using the following commands:
config firewall policy
If all of these steps are completed correctly, users that connect to a FortiSwitch interface with NAC enabled will be prompted to authenticate via SSO when they try to browse. If authentication completes successfully, they will be reassigned to a VLAN according to the NAC policy. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.