Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
dclabs
New Contributor

Outbound firewall authentication with Azure AD as a SAML IdP not working

Hi,

 

I'm testing this configuration before deploying it for a company that needs his users to authenticate against Azure AD for accessing the internet.

https://docs.fortinet.com/document/fortigate/7.0.11/administration-guide/33053

 

However it doesn't seem to work, infact after authenticating on the Microsoft login page I get redirected to the Fortigate Administration GUI webpage.

I must say that at step 3 f the "To configure the SAML SSO settings on the application and FortiGate" part, the firewall proposes me the administration GUI port instead of the default captive portal port (1003).

Also, does not respond at all on port 1003.

 

What am I doing wrong here?

 

Help appreciated.

 

Thanks in advance.

6 REPLIES 6
gfleming
Staff
Staff

Can you clarify what you mean about the docs proposing to use the admin GUI port? I see port 1003 in the docs as you referenced:

 

Screenshot 2023-03-31 at 09.46.00.png

Cheers,
Graham
dclabs

What I mean is that the guide shows the links pointing at the firewall IP address and the default captive portal port (1003), when I do that step on my firewall I’m shown the IP address and the administration GUI port 

gfleming

OK yes that's weird. Try changing it to 1003? It should be 1003 by default...

Cheers,
Graham
dclabs

I did but I get no response on port 1003, as if no service is listening on that port

Julien87
Contributor II

Hi,

I had not seen this feature. I will test it next week.

Best regards

 

 

Julien
Julien87

Hi,

 

you can check if you have the port 1003 in those parameters.

In my lab, I have the portal that opens and authenticates my user.

 

I just have an authentication problem on the fortinet side. I did not have time to diagnose this point.

 

 

 

config system global
    set auth-https-port 1003
end

 

config user saml

    edit "NAME_SAML"

        set entity-id "https://172.16.3.15:1003/saml/metadata"

        set single-sign-on-url "https://172.16.3.15:1003/saml/login"

        set single-logout-url "https://172.16.3.15:1003/saml/logout"

Julien