Description |
This article describes how to configure a Microsoft Entra ID as the Identity Provider (IDP). |
||||||||||
Scope | FortiManager and FortiAnalyzer. | ||||||||||
Solution |
FortiManager / FortiAnalyzer will be the Service provider(SP). Microsoft Azure will be the identity provider (IdP).
When SP is selected, the SP details are generated.
Edit basic SAML configuration.
In Azure (Step 2. User Attributes and Claims), add a new claim with the following details:
Delete the unused attributes.
Download the Certificate from Azure (it will be uploaded later to FortiManager).
Add the user or security group to the Users and Groups sections, so these users and/or group members can be authenticated.
In FortiManager:
Copy the values from step 4 into FortiManager IdP settings:
The next step in FortiManager is to create the admin user. There are three options for Admin users (use any of these options):
Select the admin profile that will be assigned to the admin user upon login. In this case, the admin user will be automatically created on FortiManager
To assign a specific profile (super_user, restricted_user ...) based on the Entra ID group: (FortiManager/FortiAnalyzer v7.4.3/v7.2.6 and higher).
In this case, any user that logs in will be logged in as the ssoadmin user.
Related article: Technical Tip: SAML SSO - FortiManager/FortiAnalyzer Troubleshooting Options |
Great kb thank you for this article
Excellent. Thanks for the detailed steps.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.