FortiNAC-F
FortiNAC-F is a zero-trust network access solution that provides users with enhanced visibility into the Internet of Things (IoT) devices on their enterprise networks. For legacy FortiNAC articles prior to FortiNAC-F 7.2, see FortiNAC.
dodsonj
Staff
Staff
Article Id 418590
Description This article describes how to configure FortiNAC-F Captive Portal SSO with FortiAuthenticator IdP Proxy.
Scope FortiNAC-F, FortiAuthenticator and Entra ID.
Solution

This articles assumes that the basic configuration of FortiNAC-F and FortiAuthenticator has been completed.

 

Entra ID:

Under Enterprise applications, select New application, select Create your own application, enter the Name for the application, and select Create.

 

Screenshot 2025-11-11 165808.png

 

Under App registrations, select All applications and select the previously created application.

 

Under Overview, copy the Application (client ID) and the Directory (tenant) ID.

 

Screenshot 2025-11-12 055554.png

Under Certificates and secrets, select New client secret, enter a Description, select an Expiry, and select Add.

 

Screenshot 2025-11-12 053656.png

 

Copy the secret Value.

 

Screenshot 2025-11-12 053938.png

 

Under Microsoft Entra ID, select Roles and administrators, search for Directory Readers, select Add assignments, select the previously created application, and select Add.

 

Screenshot 2025-11-12 060607.png

 

FortiAuthenticator: 

 

Under Authentication -> Remote Auth. Servers -> OAuth, select Create New, enter a Name, select Azure Directory for OAuth source, enter the previously copied Client ID, Client Key (secret Value), Azure AD tenant ID, select Include for SSO, and select Save.

 

Screenshot 2025-11-12 055031.png

 

Under Authentication -> Remote Auth. Servers -> SAML, select Create New. Under Create New Remote SAML Server, enter a Name, select Proxy for Type, select HTTPS for Entity ID, and copy the Portal URL, Entity ID, and ACS (login) URL.

 

Screenshot 2025-11-12 063408.png

 

Under Single Logout, enable SAML single logout, and copy the SLS (logout) URL.

 

Screenshot 2025-11-12 063756.png

 

Entra ID:

 

Under Enterprise Applications, select the previously created application.

 

Under Overview, select Assign users and groups, select Add user/group, select None Selected, select users and/or groups, and select Assign.

 

Screenshot 2025-11-11 170135.png

 

Under Overview, select Set up single sign on and select SAML.

 

Under Basic SAML Configuration, select Editenter the previously copied Entity ID for Identifier (Entity ID), ACS (login) URL for Reply URL (Assertion Consumer Service URL), Portal URL for Sign on URL (Optional), SLS (logout) URL for Logout URL (Optional), and select Save.

 

Screenshot 2025-11-12 062952.png

 

Under Attributes & Claims, select Edit, select Add a group claim, select All groups, and select Save.

 

Screenshot 2025-11-12 064219.png

 

Under SAML Certificates, download Federation Metadata XML.

 

FortiAuthenticator:

 

Under IdP Metadata, select Import IdP metadata, select Upload a file, select the previously downloaded Federation Metadata XML, select Import, and deselect Strip realm from username before sending.

 

Screenshot 2025-11-12 065726.png

 

Under Group Membership, select Cloud, and select the previously created OAuth server.

 

Screenshot 2025-11-12 065428.png

 

Select Save to complete the configuration of the remote SAML server.

 

Under Authentication -> User Management -> Realms, select Create New, enter the realm name for Name, select the previously created remote SAML server, and select Save.

 

Screenshot 2025-11-12 072034.png

 

Under System -> Network -> Interfaces, select the port that will provide the SAML IdP service. Under Access Rights, enable HTTPS, enable SAML IdP, and select Save.

 

Screenshot 2025-11-12 071734.png

Under Authentication -> SAML IdP -> General, enable the SAML Identity Provider portal and enter additional SAML hosts for the Server address if required.


Screenshot 2025-11-12 070556.png

 

Under Certificates, select a different certificate for Default IdP certificate if required. Note that this certificate will be uploaded to FortiNAC-F.

 

Screenshot 2025-11-12 071006.png

 

Select Save to complete the configuration.

 

Under Certificate Management -> End Entities -> Local Services, select the Default IdP certificate, and select Export Certificate if required.

 

Screenshot 2025-11-12 145155.png

 

Under Authentication -> SAML IdP -> Service Providers, select Create New. Under Create New SAML Service Provider, enter a name for SP name.

 

Screenshot 2025-11-12 073752.png

Under IdP Metadata, select the plus (+) for Create an identifier for this IdP, select Random, select OK, and download IdP metadata.

 

Screenshot 2025-11-12 123806.png

Select Save to show the SP Metadata section.

 

FortiNAC-F:

Under Network -> Service Connectors, select Create New. Under SAML SSO, select User SAML SSO.

 

Under Basics, enter a Name.

 

Screenshot 2025-11-12 124407.png

 

Under Service Provider Settings, download the SP Metadata File.

 

Screenshot 2025-11-12 125107.png

 

Under Identity Provider Settings, upload the previously downloaded IdP metadata, and the previously downloaded IdP certificate.

 

Screenshot 2025-11-12 125754.png

 

Select OK to save the configuration of the Service Connector.

 

FortiAuthenticator:

Under SP Metadata, select Import SP metadata, select Upload a file, select the previously downloaded SP Metadata file, select Save, and deselect SAML request must be signed by SP Certificate type.

 

Screenshot 2025-11-12 141828.png

Copy the SP ACS (login) URL, select Alternative ACS URLs, paste the previously copied SP ACS (login) URL and change actions to registration, then select Save.

 

Screenshot 2025-11-12 143444.png

 

Under Assertion Attributes, select Add Assertion Attributes, enter username for SAML attribute and select SAML username for User attribute.

 

Screenshot 2025-11-12 143951.png

Select Save to save the configuration of the SAML Service Provider.

 

Under Authentication -> SAML IdP -> User Sources, select Create New, select the previously created Realm for Realm, and select Save.

 

Screenshot 2025-11-12 144403.png

 

FortiNAC-F:

 

Under Portal -> Portal Configuration, select Portal, select Configuration, select Global, select Global Properties, and select Settings. Under Login Type Options, select the previously created Service Connector for Standard User Login Type, and select Save.

 

Screenshot 2025-11-12 145703.png

 

Other customizations can be made to the captive portal if required.

 

Under System -> Settings -> Control -> Allowed Domains, select Add Domain, add each of the following domains, select OK, and select Save Settings.

 

  • live.com
  • msauth.net
  • msauthimages.net
  • msftauth.net
  • msftauthimages.net
  • msidentity.com
  • trafficmanager.net
  • <fortiauthenticator-saml-idp-fqdn>

Other domains or subdomains can be added to the Allowed Domains if required. The command execute tcpdump -vi port2 host <isolated-host-ip-address> and port 53 can be used to sniff the traffic between the isolated host and the FortiNAC-F port2 interface.

 

Rogue Device:

On the Captive Portal, select User, enter Entra ID credentials, and select Continue to register the rogue device.

 

Screenshot 2025-11-12 151110.png

Screenshot 2025-11-12 151316.png

Screenshot 2025-11-12 151607.png

Screenshot 2025-11-12 151754.png

 

Screenshot 2025-11-12 151946.png

Screenshot 2025-11-12 152019.png

 

FortiNAC-F:

Under Users & Hosts -> User Accounts, verify that the user account is created with the SSO User type.

 

Screenshot 2025-11-12 152845.png

 

(Optional) Additional user and group assertion attributes.

 

Entra ID: 

Under Microsoft Entra ID, select Groups, select All groups, search for a group that the user is a member of, and copy the Object ID.

 

Screenshot 2025-11-12 155215.png

 

FortiAuthenticator: 

Under Authentication -> SAML IdP -> Service Providers, select the previously created SAML Service Provider.

 

Under Assertion Attributes, select Add Assertion Attribute, select SAML assertion for User attribute, enter surname for SAML attribute, enter http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname for Custom field.

 

Under Assertion Attributes, select Add Assertion Attribute, select SAML assertion for User attribute, enter givenname for SAML attribute, enter http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname for Custom field.

 

Under Assertion Attributes, select Add Assertion Attribute, select SAML assertion for User attribute, enter group for SAML attribute, enter http://schemas.microsoft.com/ws/2008/06/identity/claims/groups for Custom field.

 

Screenshot 2025-11-12 160616.png

 

Select Save to save the configuration of the SAML Service Provider.

 

FortiNAC-F:

Under System -> Groups, select Add, enter a Name, select User for Member Type, and select OK.

 

Screenshot 2025-11-12 163755.png

Under Network -> Service Connectors, select the previously created Service Connector. Under User Group Assignment, select Custom User Group Mapping, enter group for IdP Attribute Name, select Create New, select the previously created group for User Groupenter the previously copied Object ID for IdP Attribute Value, and select OK.

 

Screenshot 2025-11-12 164129.png

 

Under Attribute Mapping, select Create New, enter surname for IdP Attribute Name, select Last Name for FortiNAC Attribute Name, and select OK.

 

Under Attribute Mapping, select Create New, enter givenname for IdP Attribute Name, select First Name for FortiNAC Attribute Name, and select OK.

 

Screenshot 2025-11-12 164610.png

 

Select OK to save the configuration of the Service Connector.

 

Under Users & Hosts -> User Accounts, select the previously created user account, select Delete, and select Yes to de-register the device.

 

Screenshot 2025-11-10 153729.png

Rogue Device:

On the Captive Portal, select User, enter Entra ID credentials, and select Continue to re-register the rogue device.

 

FortiNAC-F:

Under Users & Hosts -> User Accounts, verify that any previously configured user attributes are present.

 

Screenshot 2025-11-12 165602.png

 

Under System -> Groups, verify that the user is assigned to the group. 

 

Screenshot 2025-11-12 165301.png
Contributors