| Description | This article describes a possible cause for a newly configured Azure Entra SSO integration not allowing logins to FortiCNAPP. |
| Scope | Integrating Azure Entra ID SAML JIT self-sign-on directly with the FortiCNAPP console (not using FortiCloud for SSO). |
| Solution |
As part of configuring Microsoft Azure Entra to provide SSO authentication for FortiCNAPP, step 5 of the Azure documentation details a configuration choice between assigning specific users and groups to the FortiCNAPP enterprise-app, or not assigning any:
The behaviour when not assigning any users or groups is effectively an 'allow all' option. (There are security considerations when setting this mode. Specifically, it allows all users (including invited external users) to sign in, and all other apps to obtain access tokens to the app being configured).
If this option is chosen, however, the initial test attempts to log in via Entra SSO will fail for all users with the following error: Error AADSTS50105 - The signed in user is not assigned to a role for the application
This error is caused by the default setting for enterprise applications is to have 'assignment-required' set to 'Yes', meaning that users or groups must be assigned to the app to log in. Properties of an enterprise application
The resolution is therefore to either:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.