FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
VinayHM
Staff
Staff
Article Id 271247
Description This article describes the troubleshooting steps when the users are not able to connect to SSL VPN and FortiClient stops at 40% or when using 'use external browser as user agent for SAML login' enabled on FortiClient it throw an error as the session ends on the browser.
Scope FortiGate.
Solution

When the user enters the credentials with 'use external browser as user agent for SAML login' enabled on FortiClient, an error appears as the session ends on the browser:

 

saml.PNG

 

Or when try to connect with FortiClient it stops at 40%. On checking the SAML debugs we see the user and group info not found as shown below. 

 

Commands to collect SAML logs:

 

diagnose debug application sslvpn -1

diagnose debug application samld -1
diagnose debug application fnbamd-1

diagnose vpn ssl debug-filter src-addr4 x.x.x.x <- Public IP address the user connects from.
diagnose debug console timestamp enable

diagnose debug enable

 

In the debug logs will see the error below:

 

No group info in SAML response.

No user name info in SAML response. Please check saml configuration.

SAML response error: 3.

 

[256:root:45]fsv_saml_login_response:510 No group info in SAML response.
[256:root:45]fsv_saml_login_response:514 No user name info in SAML response. Please check saml configuration.
[256:root:45]fsv_saml_login_resp_cb:163 SAML response error: 3.
     <-
[256:root:45]req: /remote/saml/logout?SAMLResponse=fZFBa8M
[256:root:45]fsv_rmt_saml_logout_cb:35 got SAML logout request.
[256:root:45]rmt_web_auth_info_parser_common:492 no session id in auth info
[256:root:45]rmt_web_access_check:760 access failed, uri=[/remote/logout],ret=4103,
[256:root:45]req: /remote/logoutok
[256:root:45]req: /styles.css
[256:root:45]mza: 0x2e93b20 /styles.css
[254:root:45]SSL state:warning close notify (x.x.x.x)
SSL state:warning close notify (x.x.x.x)
[255:root:45][254:root:45]sslConnGotoNextState:309 error (last state: 1, closeOp: 0)
[253:root:45][255:root:45][254:root:45]SSL state:warning close notify (x.x.x.x)

 

Solution:

Azure's attribute/claim information default claim name will be different than the one that should be set on the FortiGate, then above mentioned error will be visible. Make sure to call the group attribute/claim as in the FortiGate.

 

In FortiGate:

 

Kb 13.2.PNG

 

In Azure:

 

Kb 13.1.PNG

 

Note: 

In 'config user saml', if the 'user-name' and 'group-name' are added as below:

 

config user saml

    edit "Azure-saml"

 ...

        set user-name "username"

        set group-name "group"

 

The same must be set on the Azure end under 'Attributes & Claims'. Attributes are case-sensitive and must match on both ends.

    

Related articles:

Troubleshooting Tip: Companion for troubleshooting SSL VPN with SAML Authentication 

Technical Tip: Azure SAML group mismatch , getting error '/remote/logoutok'

Troubleshooting Tip: SAML group mismatch issue in SSL VPN