We have a usecase where we would like to split authentication and authorization. So a user would login to VPN via SAML which would return their email/username. I would then like to lookup their groups from our local AD which would be used in firewall policies.
I tried to do this using FSSO but it didn't detect the logins. Would this be possible via another method?
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi @s3
Is there any FortiAuthenticator on your environment or you have only FGT in place.
Using FAC you may configure Saml with Azure and returning these events on FAC as FSSO and than FAC forwards these events to FGT and with FSSO groups that you can define in firewall policies,
https://docs.fortinet.com/document/fortiauthenticator/6.5.0/cookbook/316341/saml-fsso-with-fortiauth...
In case using only FGT IDP will return username and group membership ,so the groups cannot be checked locally.
Unfortunately we don't have FortiAuthenticator just the FGT.
Problem is our SAML provider doesn't provide all the user's groups unfortunately.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1733 | |
1106 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.