This article describes the use of multiple Service Providers on a single Azure enterprise application for SAML SSL VPN authentication.
FortiGate, Microsoft Azure.
An Azure enterprise application provides the option to use multiple Identifiers (Entity IDs) and Reply URLs (Assertion Consumer Service URLs) for SAML SSO.
Users can log in to SSL VPN via SAML SSO authentication on different FortiGates using a single Azure application.
To create a new enterprise Azure application, follow this guide.
Follow the below steps to configure the Azure enterprise application with multiple service providers:
A Gallery application can be found the in Entra gallery catalog, as shown below:
A Non-gallery application can be created by selecting Create your own application:
After, select the option shown below to create a non-gallery application:
Configuration of the FortiGate would be the same except their local entity-id, single-sign-on-url and single-logout-url, which will have the FortiGate’s fqdn.
SAML configuration on Home FortiGate:
config user saml
edit "azure-sslvpn"
set cert "Fortinet_Factory"
set entity-id "http://homegate.float-zone.com:4434/remote/saml/metadata/"
set single-sign-on-url "https://homegate.float-zone.com:4434/remote/saml/login"
set single-logout-url "https://homegate.float-zone.com:4434/remote/saml/logout"
set idp-entity-id "https://sts.windows.net/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/"
set idp-single-sign-on-url "https://login.microsoftonline.com/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/saml2"
set idp-single-logout-url "https://login.microsoftonline.com/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/saml2"
set idp-cert "SSLVPN-NG"
set user-name "username"
set group-name "group"
set digest-method sha1
next
end
SAML configuration on Office FortiGate:
config user saml
edit "azure-sslvpn"
set cert "Fortinet_Factory"
set entity-id "http://officegate.float-zone.com:64843/remote/saml/metadata/"
set single-sign-on-url "https://officegate.float-zone.com:64843/remote/saml/login"
set single-logout-url "https://officegate.float-zone.com:64843/remote/saml/logout"
set idp-entity-id "https://sts.windows.net/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/"
set idp-single-sign-on-url "https://login.microsoftonline.com/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/saml2"
set idp-single-logout-url "https://login.microsoftonline.com/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/saml2"
set idp-cert "SSLVPN-NG"
set user-name "username"
set group-name "group"
set digest-method sha1
next
end
FortiClient SSLVPN Configuration for both FortiGates:
Users can now log in to SSL VPN on both FortiGates using Azure SAML SSO authentication.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.