Description | This article describes how to identify if 'SSO' SAML responses and assertions are signed on IdP using FortiPortal debug logs. |
Scope | FortiPortal version 7.0.0 and later. |
Solution |
After Remote authentication 'SSO' settings are configured on IdP and FortiPortal side according to the following link:
And then, the user tries to log in on FortiPortal using the remote authentication, and could receive the following error:
Authentication Error
On FortiPortal debug logs the following messages are shown: 2023-01-31 15:05:41,717 [saml2.entity:entity.py:288 apply_binding()] - INFO - HTTP POST
The above messages mean that the 'Sign SAML response and assertion' option is not enabled on the IdP side. FortiPortal will only accept signed IdP responses and assertions.
The next step is to enable the option 'Sign SAML response and assertion' on IdP and validate again that remote authentication on FortiPortal works as expected. For example, for Azure AD IdP, it is possible to review the following link: https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/certificate-signing-options
- Sign SAML assertion. - Sign SAML response. - Sign SAML response and assertion <----- This is the necessary option to use on IdP side. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.