| Description | This article describes details about SWG Policies with SSO (SAML) authentication. |
| Scope | FortiSASE. |
| Solution |
When configuring an SWG policy with SSO authentication, it is essential to use a Security Profile Group that includes Deep Inspection. See this example configuration at Configuration -> SWG Policy.
Go under Configuration -> Security -> Profile Group drop-down.
With this configuration, the implicit deny policy will be hit for HTTPS (SSL/TLS) pages, whereas plaintext HTTP pages work fine. Check the logs at Analytics -> Logs -> Traffic Filter using the known IP address of the SWG client to check the traffic.
Using the same example IP above, enable debugging on the CLI like this:
diagnose debug console timestamp enable diagnose wad filter src 126.143.20.82 <----- This is to filter debug for one specific IP only, which is useful in busy environments. diagnose wad debug enable category all diagnose debug enable
[I]2025-09-08 08:42:48.800146 wad_fw_policy_check_user :5819 L7 auth is skipped for DI.
'Access Denied' 'The page you requested has been blocked by a firewall policy restriction.'
Go to Configuration -> SWG Policy.
Note: A Deep Inspection profile includes exemptions at least for these categories:
All SSL exemptions need to be removed. Otherwise, pages of these categories that require authentication will hit the implicit deny policy as well. That also means that if SSL exemptions are required, the authentication requirement (typically a user group) on the policy needs to be removed.
Go under Configuration -> Security -> Profile Group drop-down.
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.