This article describes the use of multiple Service Providers on a single Azure enterprise application for SAML Administrator login.
FortiGate.
Azure enterprise application gives the option to use multiple Identifier (Entity ID) and Reply URLs (Assertion Consumer Service URL) for SAML SSO.
Administrators can log in to different FortiGates via SAML administrator SSO login using a single Azure application.
To create a new enterprise Azure application, please follow this guide:
Technical Tip: Configuring SAML SSO login for FortiGate administrators with Azure AD acting as SAML ...
Follow the below steps to configure the Azure enterprise application with multiple service providers:
A Gallery application can be found in the Entra gallery catalog, as shown below:
A non-gallery application can be created by selecting 'Create your own application':
Then select the option shown below which will create a non-gallery application:
Configuration of the FortiGate would be the same except for their local entity-id, which will have the FortiGate’s FQDN or IP address.
System SAML configuration on Home FortiGate:
config system saml
set status enable
set default-profile "super_admin"
set cert "Fortinet_Factory"
set entity-id "https://10.0.0.254/metadata"
set idp-entity-id "https://sts.windows.net/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/"
set idp-single-sign-on-url "https://login.microsoftonline.com/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/saml2"
set idp-single-logout-url "https://login.microsoftonline.com/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/saml2"
set idp-cert "REMOTE_Cert_4"
set server-address "10.0.0.254"
end
System SAML configuration on Office FortiGate:
config system saml
set status enable
set default-profile "super_admin"
set cert "Fortinet_Factory"
set entity-id "https://10.0.0.253/metadata"
set idp-entity-id "https://sts.windows.net/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/"
set idp-single-sign-on-url "https://login.microsoftonline.com/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/saml2"
set idp-single-logout-url "https://login.microsoftonline.com/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/saml2"
set idp-cert "REMOTE_Cert_5"
set server-address "10.0.0.253"
end
Administrators can now log in to multiple FortiGates using Azure SAML SSO authentication.
Related article:
Technical Tip: Using a single Azure Enterprise Application for multiple SAML Service Providers (SPs)...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.