FortiSASE
FortiSASE delivers both a consistent security posture and an optimal user experience for users working from anywhere. Secure your hybrid workforce by closing security gaps, plus simplify operations.
jmc01
Staff
Staff
Article Id 427293
Description This article describes the reason for the firewall authentication failure and session timeout when using FortiSASE SWG.
Scope FortiSASE.
Solution

When using a CSP_REPORT policy with a security profile configured with no SSL inspection, the following error might occur:

 

00a5d646-9cfa-4e96-8626-27c5dd47257b.png

 

The SAML cookies authentication method relies on several factors, including:

  • Cookie.
  • Referer/Origin header.
  • HTML refresh.

 

Since these elements are not included in the Content Security Policy (CSP) report, FortiSASE has introduced a new firewall policy above the SAML policy to allow SAML authentication.

 

For the policy to function correctly, a security profile with Deep Packet Inspection (DPI) or certificate inspection is required.

 

Note: Due to a known issue reported under ID 1146409, a certificate inspection profile is required for the CSP_REPORT proxy policy instead of deep inspection when using Remote Browser Isolation (RBI).

 

To assign a security profile with the Deep Packet Inspection, follow the steps below: 

 

  1. Create or modify a security profile on FortiSASE ->Security ->Security profiles > select it on the Profile group dropdown. 

 

profile csp.png

 

  1. Enabled Deep inspection on the SSL inspection setting:

 CSP_REPORT profile.png

 

  1. Assign the security profile to the CSP_REPORT proxypolicy on FortiSASE -> Security -> Proxy Policies >CSP_REPORT -> Edit -> Select the desired profile.

     

 

CSP_REPORT.png

 

CSP_REPORT.png

 

Note: When using a security profile with Deep inspection disabledthis policy show an red warning as illustrated below:

  warning.png