Dear community,
We are using FortiAuthenticator as External Authentication source for our FortiSIEM-users, providing us MFA. At the moment, we followed the guide for External Authentication Settings and set up this integration via RADIUS.
It works fine, but of course entering the 6 digits of FortiToken is not very appealing to users ;)
So, we'd like to move to SAML. I am not deep into the information that needs to be exchanged between both tools. The FSM docs focus on Okta and Azure AD which work a little different to FAC. Has anyone here experience in connecting these two components and likes to share the general config steps?
If not, we will figure out and I will share our experience in a few weeks...
Best,
Christian
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Ok, now, as promised, here is the step-by-step guide:
On FortiAuthenticator
Now, you can switch to FortiSIEM
On FortiSIEM
I hope this helps everyone how is facing the same question like I did.
Best,
Christian
Hi Christian,
Yes we have successfully integrated the systems together. Have a look here https://docs.fortinet.com/document/fortiauthenticator/6.5.3/administration-guide/817031/saml-idp for the IDP initiated request.
When we are talking about a single tenant FortiAuthenticator does the job. Unfortunately because FortiSIEM does not support SP initiated assertions, if you have a multi-tenanted environment FortiAuthenticator cannot perform RBAC of the Idp links. So if you login to FortiAuthenticator then all links for all tenants are shown which might be considered a data leak.
In multi-tenanted environments you have either the option to setup a FortiAuth per tenant or review some of the options out-there for SAML.
Please let me know if you need more info, maybe I can put a document together and have it submitted to KB section.
Regards,
S
Hi @sioannou,
Thanks for your detailed answer!
In fact, I would love to have some kind of step by step guide for setting up both sides, just like the Okta or AAD setup is in the docs. But I have to admit, I have not done any SAML integration anywhere yet and I suppose as soon as I did that, it will become much clearer which parameters stand for what.
In my case, we do have a multi tenant environment but are talking about granting access to the SOC team only for the moment, so there won't be the need for tenant support at least at that point. However, I will take that into consideration and do a bit of research on how to tackle this for future accounts.
Thanks for the moment!
Best,
Christian
Created on 10-30-2023 02:58 AM Edited on 10-30-2023 04:17 AM
Hi @sioannou,
I've now started configuring the main options. I will list them in a full setup here, once it works.
I am currently stuck on FortiSIEM explaining me
Invalid username or password or organization. ErrorCode : 3001
I've created custom attribute statements with "organization" and "username" which send "super" and the according username. On FSM, I set "User" and "Org" to these custom attributes. The user I try to use (which is a super admin) has only the SAML-profile as external authentication source configured.
Am I missing something obvious here?
Thanks already!
Christian
EDIT: I know these information get through using the SAML-trace browser plugin. The attributes appear under "SAML 2.0 AttributeStatement".
You may ignore this post. I found the solution. The organization is case-sensitive and "super" does not equal "Super".
Ok, now, as promised, here is the step-by-step guide:
On FortiAuthenticator
Now, you can switch to FortiSIEM
On FortiSIEM
I hope this helps everyone how is facing the same question like I did.
Best,
Christian
Welcome to your new Fortinet Community!
You'll find your previous forum posts under "Forums"
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.