FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Rajneesh
Staff
Staff
Article Id 423690
Description This article describes the SAML attributes that play an important role in the authentication of the supplicant.
Scope FortiGate, FortiAuthenticator.
Solution

SAML (Security Assertion Markup Language) attributes are data elements included in a SAML authentication assertion that provide information about the authenticated user.

 

These attributes contain details such as the user's identity, roles, permissions, and other relevant information.

They are commonly used in Single Sign-On (SSO) and identity federation systems to enable seamless authentication and authorization.

 

The authentication of the user is successful only when the attribute name matches on the FortiGate and on the IDP end, which will be sent in the assertion from the IDP.

 

For example, the attributes configured on the FortiGate are shown below:

 

Screenshot_18-12-2025_162232_10.5.146.52.jpeg

 

The same attributes should come in the SAML assertions from the IDP when the user is authenticated; if not, the authentication will fail.

 

SAML debug logs mentioned below can be taken from the FortiGate :

 

diagnose debug application samld -1

diagnose debug enable

 

samld_send_common_reply [101]: Attr: 17, 31, magic=01090d809aa7a746
samld_send_common_reply [101]: Attr: 18, 29, 2025-12-18T09:17:49Z
samld_send_common_reply [98]: Attr: 10, 26, 'username' 'testuser'
samld_send_common_reply [98]: Attr: 10, 23, 'group' 'testuser'

 

The response from the IDP and attributes are matching as configured on the FortiGate. 

 

Related article:

Technical Tip: SAML attribute mapping