Created on 11-24-2021 06:03 AM Edited on 11-04-2024 10:33 AM By Stephen_G
Description | This article describes how to troubleshoot SAML authentication. |
Scope | FortiGate. |
Solution |
A situation may occur in which the SAML for the SSL VPN/Admin access to GUI is configured correctly according to the Fortinet documentation, but the authentication is still not successful.
The proper approach in such a case would be to run the debug for the samld (process responsible for the SAML authentication).
Note:
Before running the commands below, make sure to capture the console output to a file.
Follow this article for instructions on how to capture the output in the text file with PuTTY:
Technical Tip: How to create a log file of a session using PuTTY
Failed to process response message. ret=440(The profile cannot verify a signature on the message)
A solution for such a case would be to:
If the issue was related to certificate. After applying the above changes, the authentication now should be successful.
Note: For MFA authentication, verify the remote authentication timeout value. The default remote authentication timeout value is 5 seconds. To increase the timeout value for MFA, use the following commands:
config system global set remoteauthtimeout 60 end
To collect the SAML logs from the user browser, use SAML extensions:
For Google Chrome:
For Firefox:
SAML-tracer Firefox Note: Each FortiGate requires a unique Assertion Consumer Service (ACS) URL (e.g., https://<local-ip>:1003/remote/saml/login), which must match the registered URL in Azure AD. Since each FortiGate has a different IP, using a single SAML instance for multiple FortiGates would fail to meet this strict URL binding requirement, leading to authentication failures. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.