- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Use SAML in firewall policies?
We are using SAML to Azure AD for Fortigate SSLVPN.
Tried using the same group for a firewall policy and we get redirected to our SAML SP, but that does a redirect back to the SSLVPN portal as configured "Sign on URL: https://<FortiGate IP address or FQDN>:<Custom SSL VPN port>/remote/login"
Anyone that have used SAML in firewall policies and in that case what signon/reply URLs are you using?
Thanks!
- Labels:
-
FortiGate
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @esec
What do you like to achive?
Would you like to use SAML User Group for internal Policy (e.g. lan1 to wan1)?
Usergroups for SSLVPN SAML works only with SSLVPN. The reason behind is the callback URL from SAML.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
We would like to use SAML User Group for internal policy.
My question is if it is possible and if it is, what reply/signon or callback URL that needs to be configured.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi
You have to configure it als "Authentication Scheme" for explicit and transparent proxies.
Follow this documentation:
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi esec,
Can you try below format.
set single-sign-on-url "https://<FortiGate IP address or FQDN>:<Custom SSL VPN port>/remote/saml/login"
set single-logout-url "https://<FortiGate IP address or FQDN>:<Custom SSL VPN port>/remote/saml/logout"
Suraj
- Have you found a solution? Then give your helper a "Kudos" and mark the solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi esec,
I think this is actually the documentation you are looking for:
As Suraj pointed out, the links are not correct. remote/saml/.... is the correct format.
Since we see it often mistaken:
The SAML configuration will require a
set user-name "username"
set group "group"
This part says literally:
In the SAML response we found the username VALUE in the ATTRIBUTE called "username".
In the SAML response we found the group VALUE in the ATTRIBUTE called "group".
Whatever your IdP uses as Attribute for putting the user/group into - set it here appropriately.
Best regards,
Markus
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
it seems like that /remote/saml is for SSLVPN and for firewall authentication /saml/login according to the documentation below, I will try to test it out :)
Administration Guide | FortiGate / FortiOS 6.4.2 | Fortinet Documentation Library
Best Regards
