# diagnose debug application samld -1# diagnose debug application sslvpn -1# diagnose debug enable
In this scenario, the log showed 'SAML group mismatch':
[09:22:41][176:root:2ab5]fsv_saml_login_response:477 No group info in SAML response.[09:22:41][176:root:2ab5]fsv_saml_login_resp_cb:173 SAML group mismatch.
This indicates the group name 'group' configured was different from what was returned from the SAML IdP.Configured group in FortiGate:
Attribute Name: "group"Attribute Value: "SSL-SAML"
# config user samledit "ras.test"..set group-name "group" <----- Attribute Name for group-name.# config user groupedit "azure_test"set member "ras.test"# config matchedit 1set server-name "ras.test"set group-name "SSL-SAML" <------ Attribute Value for group-name.nextend
But in the debug log, it showed the Attribute Name returned was 'http://schemas.microsoft.com/groups' (instead of 'group').
[09:22:41]samld_send_common_reply [120]: Attr: 10, 104, 'http://schemas.microsoft.com/groups' 'SSL-SAML'
The solution is to correct the attribute name in IdPFrom: 'http://schemas.microsoft.com/groups'.to: 'group'.(or vice versa, configure the 'group-name' in FortiGate to match the returned attribute-name 'http://schemas.microsoft.com/groups'.
# config user samledit "ras.test"..set group-name "http://schemas.microsoft.com/groups"Related Articles
Technical Tip: Configure group based policies for SAML users
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.