| Description | This article describes why FortiGate may use the default Fortinet_Factory certificate for SAML authentication even when a custom/wildcard certificate is defined, and how to fix it. |
| Scope | FortiGate. |
| Solution |
Even when a wildcard certificate is installed and specified in the SAML profile. FortiGate may still use the default Fortinet certificate.
FortiGate is configured as a SAML Service Provider. Internal users access a web portal over HTTPS and authenticate via SAML through FortiGate.
When users try to authenticate, the connection uses the default certificate instead of the intended 'wildcard2025' certificate.
To confirm this behavior, use the following debug commands. Replace x.x.x.x with the client’s public IP:
diagnose vpn ike log-filter rem-addr4 x.x.x.x
A log snippet may appear as follows:
2025-10-01 09:18:59 [authd_http_set_server_cert:792]: found Fortinet_Factory.com -> Redirecting it to default certificate instead of wildcard certificate.
To ensure the correct certificate is presented, configure it under user settings:
config user settings
[authd_http_set_server_cert:792]: found Fortinet_Factory for wildcard2025.com <----- Now presenting 'wildcard2025' certificate. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.