Hello everybody
In order to anticipate futur end of life of VPNSSL function, i try to make working VPN acces by IPSEC.
Actually :
1 fortigate 100f
1 wan fiber
2 SSO connexions, for 2 different Microsoft tenants
2 VPN SSL REALMS
2 SSL PORTAL in tunnel mode
In SSL Settings, i use SSL portal mapping
In forticlient 2 configurations, one per realms, both pointing to the same wan ip/port, juste realms is different.
I would like to make the same configuration but with IPSEC.
nowday i make working IPSEC with SAML, but only for 1 tenant.
following this guide : https://docs.fortinet.com/document/fortigate/7.4.7/administration-guide/951346/saml-based-authentica...
I don't know how to do this, as my wan link is configured to listen and transfer to a single SSO configuration (saml server).
config system global set auth-ike-saml-port <integer> end
config system interface edit <name> set ike-saml-server <saml_server> next end
Thanks for your futur help
Hello,
Thank you for using the Community Forum. I will seek to get you an answer or help. We will reply to this thread with an update as soon as possible.
If anyone viewing this topic has any knowledge on this, I encourage you to reply.
Thanks,
Hello,
We are still looking for an answer to your question.
We will come back to you ASAP.
Once more, if anyone has any advice, please feel free to share it.
Thanks,
Created on ‎05-11-2025 09:46 PM Edited on ‎05-11-2025 09:50 PM
As far as I know SSL VPN wouldn't go away any time soon if your FGT is 100F, a rack-mountable model with 7.6GB memory. Two of our customers are using 100F for their HQ with SSL VPN, and we're assuring them they can keep using it.
First I have to tell you I never made, or even tried, implementing Entra ID groups with dialup IPsec VPN on any FGTs. So this is just based on my on-line research.
You already made Entra ID work for dialup ipsec over SAML so you already cleared this part. But this is what I could find in FTNT's KBs:
https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-configure-Microsoft-Entra-ID-SAML/t...
For the multiple groups on the Entra ID side, it's a question to Microsoft and I couldn't find any FTNT KB about that. So you have to figure it out by yourself. Or you might be able to ask MS Azure support for how to.
But I found a third party article how to incorporation groups over SAML on the FGT side by policies:
https://www.andrewtravis.com/blog/ipsec-vpn-with-saml
This guy uses FortiAuthenticator(FAC) as IdP, not Entra ID, and set groups there. But I'm assuming the FGT side should be similar if not identical.
So try combining those and let all the rest know how it went. If you could figure this out, this thread would become one of those KB equivalent articles helping all other FGT users, which I'm sure I would give you kudos.
Good luck.
Toshi
Thanks for our help.
The main problem is with 2 realms (2 tenants).
Just with one like your article, it is working fine, and i validate than groups in policy can be use to filter users acces.
This point is good and replacing weel SSL solution.
In the initial SSL case :
In the new IPSEC case :
I don't know if my request (problem) is clear, or if i don't understand somethings.... but with all informations i knows, i don't see how to make working that in my case.
Created on ‎05-12-2025 10:26 AM Edited on ‎05-12-2025 10:29 AM
I would suggest just open a ticket at TAC and call in. So that a TAC person who has expertise in this operation can take a look inside the FGT to troubleshoot.
One of those two 100F customers I mentioned uses Entra ID groups to separate two user groups for their SSL VPN WITHOUT using realms. We just configured two different user groups with the group ID infomation the customer provided from Entra ID but both groups are referring to the same SAML. And they're working as expected to separate them via policies.
So I naturally assume the same way would work for dialup IPsec.
Toshi
Created on ‎05-12-2025 10:48 AM Edited on ‎05-12-2025 10:49 AM
Probably I should have showed for other readers of this post (I know you already know this) how the group is configured:
config user group
edit "first_group/second_group"
set member "azure-saml" <-- this is the same SAML for both groups
config match
edit 1
set server-name "azure-saml"
set group-name "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" <-- this is the unique group ID
next
end
next
end
Toshi
Similar setup and the issue is not with the hardware, its when 7.4.x is finally forced as the supported version.
I have a client with 4 realms each going to a separate Azure Tenant.
A > Azure 1
B > Azure 2
C > Azure 3
D > Azure 4
right now its controlled by adding /A,B,C,D to the URL to select the correct Tenant. How can we do the same with IKE DU.
some customers have multiple IPs but Others only have a Single WAN IP.
is it possible to have mutiple listening ports for SAML IKE ?
The last comment of this thread is describing how "peer ID"(FGT side) and "local ID"(FortiClient side) work to have multiple dialup config on the FGT with separate user groups on the ForitiClient side.
https://community.spiceworks.com/t/second-dialup-ipsec-forticlient-tunnel-does-not-work/653924/8
Toshi
User | Count |
---|---|
2574 | |
1375 | |
796 | |
657 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.