FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
kiri
Staff
Staff
Article Id 241591
Description This article describes how to configure FortiGate to accept admin logons over SAML with LDAP credentials.
Scope FortiAuthenticator 6.X.
FortiGate 6.2, 6.4, 7.X.
Solution

In FortiAuthenticator, follow the steps below:

  1. Enable the SAML Identity Provider portal.
  2. Set either an IP or FQDN (preferred) server address and a prefix.
  3. Select the correct realm. In this case, select LDAP.
  4. Create a remote group. Add users/admins and a filter for the group.

 

1.jpg

 

  1. Download the IDP server certificate highlighted above.
                                                         

    2.jpg

     

  2. Create an SP:
                                                              

    3.jpg

     

Add the following claim, filling in details as necessary:
SAML attribute: 'username'.
User attribute: Remote LDAP Server: samAccountName (or Username attribute: configured in Auth, Remote Auth Servers, LDAP).
                               

4.jpg

 

Follow the steps below in FortiGate:

 

  1. Enable SSO Admin login.
  2. For the IdP address, provide the IP or FQDN (preferred) and a prefix. The details should be the same as configured in step 2.

  3. Upload the certificate downloaded in step 4.
                                                    

    5.jpg

     

    Alternatively, run the following in the CLI (the details provided are examples):

    config system saml
        set status enable
        set default-profile "super_admin"
        set idp-entity-id "http://fortiauth.local/saml-idp/fgtadm/metadata/"
        set idp-single-sign-on-url "https://fortiauth.local/saml-idp/fgtadm/login/"
        set idp-single-logout-url "https://fortiauth.local/saml-idp/fgtadm/logout/"
        set idp-cert "fortiauth.local_SAN"
        set server-address "10.191.19.149:4443"

    end

     

  4. Logout from FortiGate, refresh, select the SSO option, and auth with LDAP credentials on FortiAuthenticator (IDP):

     

    6.jpg

     

    7.jpg

     

  5. Login to the firewall as an SSO admin. If the steps are completed, this will succeed.
                                                                                            

    8.jpg

     

    9.jpg                                                                   
  6. Right now, there are no options to configure SAML SSO-admin authentication per VDOM based. As a workaround, these steps could be performed (if it fits):
    1. If possible, set FortiGate's SSO URL to an FQDN and use DNS to point to different VDOM IPs to make some users hit the FortiGate with different IPs using the same FQDN.
    2. Add VDOM to admin account's VDOM list, (not ideal if permission is a problem).
    3. Change the SSO URL to the VDOM's IP that is needed. Refer to this article on how to resolve two different IPs per FQDN.

If there is a requirement to bind admin users to the SAML accounts and provide access to the specific VDOM, then follow Technical Tip: FortiGate - Admin login with remote Radius and vdom access profile:

  • FortiAuthenticator acting as a RADIUS Server.
  • FortiGate is configured as a RADIUS client, with remote admin wildcard group, and VDOM override enabled.

 

Troubleshooting:
Useful debug commands - httpsd (general admin GUI debugging), samld (SAML-specific debugs).
Usage:
 
diagnose debug application httpsd -1
diagnose debug application samld -1
diagnose debug console timestamp enable
diagnose debug enable