This article describes how to configure SAML authentication using Azure as IdP.
FortiPAM.
The SAML authentication has been deployed since FortiPAM 1.0 version.
This document will focus on SAML Authentication with Microsoft Azure as the SAML IDP.
Additionally, multiple-group can be used to authenticate users in FortiPAM.
Configuration Steps for Microsoft Azure SAML Application.
Note.
This configuration assumes users and groups are already created in Azure.
Figure 1. Create your own application Azure
Once the application is deployed, assign users and groups created before as desired:
Figure 2. Adding user/groups
Configure the Single Sign On URLs for the newly created SAML Application.
Figure 3. Basic SAML Configuration
Configure the Attribute and Claims for the newly created SAML Application.
When editing Attribute & Claim, make sure that the username claim name has value: 'user.userprincipalname' and group claim has the value: 'user.groups'.
However, the claim name must match with 'user-name' and 'group-name' attributes/claims configured in FortiPAM.
Figure 4. Creating Attributes & Claims
Note.
Claim names are case-sensitive attributes.
Username claim details.
Figure 5. Username claim details
Group claim details.
Figure 6. Group claim attribute
Download the certificate in Base64 format to be imported later on to FortiPAM.
Figure 7. Download IdP certificate
Configuration steps in FortiPAM.
Go to Sytem-Certificates-Create/Import -> Remote Certificate.
Figure 8. Import IdP certificate on FortiPAM
Create a new Single Sign-On server matching the IdP settings configured previously in Azure.
Figure 9. Create SSO in FortiPAM
Enable SAML authentication on FortiPAM.
config system global
set saml-authentication enable
end
Create a remote SAML group on FortiPAM.
Go to User Management -> User Groups -> Create.
Figure 10.Creating Saml Group in FortiPAM
Create a SAML user on FortiPAM
Go to User Management -> User Lists -> Create.
Note: Enable Force SAML login for new users created.
Figure 11. Create SAML user
Results from authentication.
Figure 12.User authenticated
Troubleshooting debug commands on FortiPAM CLI:
diagnose debug console timestamp enable
diagnose debug app samld -1
diagnose wad debug enable category auth
diagnose debug app fnbamd -1
diagnose debug enable
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.