I really run out of idea on user grouping based on Azure Entra ID object ID.
I Follow the administration guide to prepare SSL VPN migrate to IPSec VPN with SAML
https://docs.fortinet.com/document/fortigate/7.6.0/administration-guide/951346/saml-based-authentica...
On phase 1 configuration I face EAP credential error
config vpn ipsec phase1-interface edit "FCT_SAML" set eap enable set eap-identity send-request next end
Look for lots of tech doc only this work
https://community.fortinet.com/t5/FortiGate/Technical-Tip-Error-EAP-failure-with-IPsec-Dial-Up-VPN-u...
Which mean I had to define the user Group without any Entra Object ID to make user authenticate success or firewall policy with the user group without Entra ID object.
config vpn ipsec phase1-interface
|
So no issue getting user connect with FortiClient IPSec
diagnose vpn ike gateway list
vd: root/0 id/spi: 148531 |
but .......................
How to match or group user based on ingested Entra object id ?
if I define any object ID in the user group the EAP authentication will failed so i had to left it blank to make user connect success.
SAML Debug log
config user group |
Firewall policy wont work
p/s
1. Don't recommend local peer id as user/me has no time to manage it by each department/devices
2. Tried FSSO but there is limitation especial for those BYOD, since is not join domain so wont update netlogon to AD especial VVIP devices.
3. No TAC case is allow as no FortiClient license.
4. Really need interim solution before 7.4 EoE at March 2026.
5. No IKEv1 ( This feature requires FortiClient 7.2.4 and FortiClient supports only using IKEv2)
can you do a, show user saml ?
L.E. I would suggest the following:
- ensure that under config user saml you have for group
i) either set group-name "group" , if you configured this and use this
ii) either set group-name "http://schemas.microsoft.com/ws/2008/06/identity/claims/groups" , this would be confirmed if required from here
iii) in your case you might use FortigateGroups and require set group-name FortigateGroups ? you would get more clarity about what to configure when you do a debug and see what saml attributes you get.
- in the phase1 , unset authusrgrp and use/create groups based on SAML which you add in firewall rules at the source alongside the ipsec range
User | Count |
---|---|
2626 | |
1400 | |
810 | |
672 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.