Created on
12-18-2025
04:08 AM
Edited on
12-19-2025
02:04 AM
By
Jean-Philippe_P
| Description | This article describes the SAML attributes that play an important role in the authentication of the supplicant. |
| Scope | FortiGate, FortiAuthenticator. |
| Solution |
SAML (Security Assertion Markup Language) attributes are data elements included in a SAML authentication assertion that provide information about the authenticated user.
These attributes contain details such as the user's identity, roles, permissions, and other relevant information. They are commonly used in Single Sign-On (SSO) and identity federation systems to enable seamless authentication and authorization.
The authentication of the user is successful only when the attribute name matches on the FortiGate and on the IDP end, which will be sent in the assertion from the IDP.
For example, the attributes configured on the FortiGate are shown below:
The same attributes should come in the SAML assertions from the IDP when the user is authenticated; if not, the authentication will fail.
SAML debug logs mentioned below can be taken from the FortiGate :
diagnose debug application samld -1 diagnose debug enable
samld_send_common_reply [101]: Attr: 17, 31, magic=01090d809aa7a746
The response from the IDP and attributes are matching as configured on the FortiGate.
Related article: Technical Tip: SAML attribute mapping |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.