We have a usecase where we would like to split authentication and authorization. So a user would login to VPN via SAML which would return their email/username. I would then like to lookup their groups from our local AD which would be used in firewall policies.
I tried to do this using FSSO but it didn't detect the logins. Would this be possible via another method?
Hi @s3
Is there any FortiAuthenticator on your environment or you have only FGT in place.
Using FAC you may configure Saml with Azure and returning these events on FAC as FSSO and than FAC forwards these events to FGT and with FSSO groups that you can define in firewall policies,
https://docs.fortinet.com/document/fortiauthenticator/6.5.0/cookbook/316341/saml-fsso-with-fortiauth...
In case using only FGT IDP will return username and group membership ,so the groups cannot be checked locally.
Unfortunately we don't have FortiAuthenticator just the FGT.
Problem is our SAML provider doesn't provide all the user's groups unfortunately.
User | Count |
---|---|
1922 | |
1144 | |
769 | |
447 | |
277 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.