Created on 08-22-2024 11:10 AM Edited on 08-31-2024 05:22 AM By Jean-Philippe_P
Description | This article describes a solution for cases where an Azure user is redirected to the Microsoft portal and authenticates successfully, but is denied access afterwards by FortiGate. |
Scope | All supported versions of FortiGate, SAML authentication, captive portal, SSL VPN, dial-up IPsec. |
Solution |
This behavior occurs because there is no match between SSO group assertions settings on FortiGate and the assertions that arrive from Azure. A very common cause of this is when a user belongs in more than 150 groups on Azure (including nested groups).
If this happens, Azure substitutes the group attribute (usually 'http://schemas.microsoft.com/claims/groups' or just 'groups') with a 'group.link' attribute (see the documentation), which contains a link to https://graph.windows.net/<identityProviderID>/users/<UserObjectID>/getMemberObjects instead of a group ID as its value.
To resolve this, edit the Attributes and Claims which are on Single Sign-On at Azure, and change 'Security groups' to 'Groups assigned to the application'. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.