Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
L-L
New Contributor

Outbound firewall auth + Microsoft Entra ID SAML IdP - Let's Encrypt cert for FGT SP

Hi All,

 

Managed to get outbound firewall authentication using Entra ID as SAML IdP to work.  
My issue is this.  I do not want to stay installing the Fortigate CA SSL cert on each endpoint that needs internet access, as instructed in the Fortigate's how-to site. 

 

Was wondering if I could use Let's Encrypt SSL cert for this?  Anyone know the way forward, or perhaps managed to get it working like this?  I already tried using a Let's Encrypt cert pointing to my public IP in FGT and configured this in my EntraID config, but doesn't work.  At a certain point, the local computer gets re-directed to the local internal IP address of the fortigate and seems to ignore the FQDN configured in EntraID and in FGT SP.

 

Any ideas?

 

Much appreciated. 

5 REPLIES 5
AnthonyH
Staff
Staff

Hello L-L,

 

Could you share if the SAML configuration on the FortiGate is pointing to FQDN? And two things to check: 1) Under SSLVPN Settings -> Server certificate, it is using the lets encrypt cert? 2) Under User & Authentication -> SSO, are you also referencing the lets encrypt here as well?

Technical Support Engineer,
Anthony.
L-L
New Contributor

Hello Anthony,

 

SAML configuration on the FortiGate is pointing to FQDN which resolves to the Public IP address (WAN1) on the FGT itself.

 

I'm using FortiOS ver 7.4.5, on a FGT 60e, so SSLVPN settings is not available for me.  

 

Under User & Authentication -> SSO, I AM referencing to the "Lets encrypt" cert.

L-L
New Contributor

So, after some tinkering I though to myself, if it wants to use the internal interface IP address, why not make it happy?  So what I did was to enable the local DNS server on the FTG itself and create a zone with the same domain name as the ones used for the 'Let's Encrypt' cert.  Like this I create a split-brain DNS.  Also, to keep in mind the local-in policies which doesn't seem to allow AuthD from an external interface. 

L-L
New Contributor

to add that to make this work you need to force the FGT to effectively make use of a FQDN for the authentication portal: 

config firewall auth-portal
portal-addr "my.fqdn.com"

"my.fqdn.com"  being obviously the domain used for the digital cert.

I have now another problem though.. :)

Everything works fine if the end user initiates a connection to an http site.  If so, the user gets redirected to enter his MS credentials.  

If a user enters an httpS web address, I get a  certificate error and the MS authentication process never kicks in.

Anyone has a clue?

 

Thank you!

pminarik

In order to redirect from a https:// request, you need to do the same as you would do with deep SSL inspection (e.g. for webfiltering).

The CA certificate used for this redirection is defined in config user setting > set auth-ca-cert.

 

For internal endpoints, you will handle this like you would with DPI.

For guests, no solution exists (on the assumption that distributing your private CA is not feasible). Best you can do is exclude HTTPS from redirects (simply dropping the packets = no cert error to client) and rely on clients doing plain http:// probes (which they mostly do, AFAIK).

[ corrections always welcome ]
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors