This article describes the use of multiple Service Providers on a single Azure enterprise application for SAML SSL VPN authentication.
FortiGate, Microsoft Azure.
An Azure enterprise application provides the option to use multiple Identifiers (Entity IDs) and Reply URLs (Assertion Consumer Service URLs) for SAML SSO.
Users can log in to SSL VPN via SAML SSO authentication on different FortiGates using a single Azure application.
To create a new enterprise Azure application, follow this guide.
Follow the below steps to configure the Azure enterprise application with multiple service providers:
A Gallery application can be found the in Entra gallery catalog, as shown below:
A Non-gallery application can be created by selecting Create your own application:
After, select the option shown below to create a non-gallery application:
Configuration of the FortiGate would be the same except their local entity-id, single-sign-on-url and single-logout-url, which will have the FortiGate’s fqdn.
SAML configuration on Home FortiGate:
config user saml
edit "azure-sslvpn"
set cert "Fortinet_Factory"
set entity-id "http://homegate.float-zone.com:4434/remote/saml/metadata/"
set single-sign-on-url "https://homegate.float-zone.com:4434/remote/saml/login"
set single-logout-url "https://homegate.float-zone.com:4434/remote/saml/logout"
set idp-entity-id "https://sts.windows.net/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/"
set idp-single-sign-on-url "https://login.microsoftonline.com/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/saml2"
set idp-single-logout-url "https://login.microsoftonline.com/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/saml2"
set idp-cert "SSLVPN-NG"
set user-name "username"
set group-name "group"
set digest-method sha1
next
end
SAML configuration on Office FortiGate:
config user saml
edit "azure-sslvpn"
set cert "Fortinet_Factory"
set entity-id "http://officegate.float-zone.com:64843/remote/saml/metadata/"
set single-sign-on-url "https://officegate.float-zone.com:64843/remote/saml/login"
set single-logout-url "https://officegate.float-zone.com:64843/remote/saml/logout"
set idp-entity-id "https://sts.windows.net/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/"
set idp-single-sign-on-url "https://login.microsoftonline.com/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/saml2"
set idp-single-logout-url "https://login.microsoftonline.com/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/saml2"
set idp-cert "SSLVPN-NG"
set user-name "username"
set group-name "group"
set digest-method sha1
next
end
FortiClient SSLVPN Configuration for both FortiGates:
Users can now log in to SSL VPN on both FortiGates using Azure SAML SSO authentication.
Related Articles:
Technical Tip: How to fix crashing SAML daemon
Technical Tip: How to read SAML Debug output
Technical Tip: A basic explanation of SAML authentication
Technical Tip: Configuring SAML SSO login for FortiGate Admin Web GUI Access with JumpCloud acting a...
Technical Tip: Configuring SAML SSO login for FortiGate administrators with Okta acting as SAML IdP
Technical Tip: Set up SAML admin LDAP login on FortiGate (SP) with FortiAuthenticator (IDP)
Technical Tip: Configuring FortiGate SSO Administrators with ADFS as SAML IdP
Technical Tip: Using single Azure Enterprise Application for multiple SAML Service Providers (SPs) f...
Troubleshooting Tip: Admin authentication with SAML SSO breaks after upgrade to firmware 7.4.1
Technical Tip: Configure SAML SSO for WiFi SSID over Captive Portal with Azure AD as IdP
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.