Hi, i have followed the configuration guide from the below link Configure SAML SSO for WiFi SSID over Cap... - Fortinet Community, and the authentication works well, within the default settings. However, since the captive portal user traffic is not encrypted, I decided to switch to WPA2 with PSK and captive portal. After this change, users receive an IP address (after providing the PSK), but the auth process doesn't occur, SAML auth request is not showing during the debug, and users see a "site cannot be reached" error when trying to access any website. Is it possible to configure SAML SSO but with any level of user traffic encryption? Fortigate 61f - soft 7.2.9
Hi Duchwwo,
Try to increase the remote authentication timeout:
config system global
set remoteauthtimeout 60
end
Also, can you please attach the SAML logs here to check further:
diag debug console timestamp enable
diag debug app samld -1
diag debug enable
Hi kaman, I had these settings applied previously. However, after recreating the ssid from scratch, I managed to complete the authentication process for Windows users. For macOS, saml is working only without WPA2. After enabling encryptionm safari displays the following:
Fortigate certificate has been delivered to macOS and its trusted, captive.apple.com has also been exempt from captive portal. From saml debug logs i can see that the request has been sent, but without reply. I will share the SAML logs after the holidays.
Hrllo @Duchwwo,
1. Please try to download .HAR file (Developer tool) from browser when replicating the issue, that might give some clue.
2. You can also install SAML Tracer extension and then check again.
regards,
Sheikh
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1740 | |
1109 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.