{"id":4436,"date":"2022-11-10T09:27:56","date_gmt":"2022-11-10T17:27:56","guid":{"rendered":"https:\/\/SUMMALAI.COM\/?p=4436"},"modified":"2022-11-10T09:28:00","modified_gmt":"2022-11-10T17:28:00","slug":"how-to-setup-azure-ad-sso-integration-with-fortigate-ssl-vpn","status":"publish","type":"post","link":"https:\/\/SUMMALAI.COM\/?p=4436","title":{"rendered":"How to Setup Azure AD SSO integration with FortiGate SSL VPN"},"content":{"rendered":"\n<p>In this tutorial, you&#8217;ll learn how to integrate FortiGate SSL VPN with Azure Active Directory (Azure AD). When you integrate FortiGate SSL VPN with Azure AD, you can:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Use Azure AD to control who can access FortiGate SSL VPN.<\/li><li>Enable your users to be automatically signed in to FortiGate SSL VPN with their Azure AD accounts.<\/li><li>Manage your accounts in one central location: the Azure portal.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"prerequisites\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#prerequisites\"><\/a>Prerequisites<\/h2>\n\n\n\n<p>To get started, you need the following items:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>An Azure AD subscription. If you don&#8217;t have a subscription, you can get a&nbsp;<a href=\"https:\/\/azure.microsoft.com\/free\/\">free account<\/a>.<\/li><li>A FortiGate SSL VPN with single sign-on (SSO) enabled.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"tutorial-description\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#tutorial-description\"><\/a>Tutorial description<\/h2>\n\n\n\n<p>In this tutorial, you&#8217;ll configure and test Azure AD SSO in a test environment.<\/p>\n\n\n\n<p>FortiGate SSL VPN supports SP-initiated SSO.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"add-fortigate-ssl-vpn-from-the-gallery\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#add-fortigate-ssl-vpn-from-the-gallery\"><\/a>Add FortiGate SSL VPN from the gallery<\/h2>\n\n\n\n<p>To configure the integration of FortiGate SSL VPN into Azure AD, you need to add FortiGate SSL VPN from the gallery to your list of managed SaaS apps:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Sign in to the Azure portal with a work or school account or with a personal Microsoft account.<\/li><li>In the left pane, select&nbsp;<strong>Azure Active Directory<\/strong>.<\/li><li>Go to&nbsp;<strong>Enterprise applications<\/strong>&nbsp;and then select&nbsp;<strong>All Applications<\/strong>.<\/li><li>To add an application, select&nbsp;<strong>New application<\/strong>.<\/li><li>In the&nbsp;<strong>Add from the gallery<\/strong>&nbsp;section, enter&nbsp;<strong>FortiGate SSL VPN<\/strong>&nbsp;in the search box.<\/li><li>Select&nbsp;<strong>FortiGate SSL VPN<\/strong>&nbsp;in the results panel and then add the app. Wait a few seconds while the app is added to your tenant.<\/li><\/ol>\n\n\n\n<p>Alternatively, you can also use the&nbsp;<a href=\"https:\/\/portal.office.com\/AdminPortal\/home?Q=Docs#\/azureadappintegration\">Enterprise App Configuration Wizard<\/a>. In this wizard, you can add an application to your tenant, add users\/groups to the app, assign roles, as well as walk through the SSO configuration as well.&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/admin\/misc\/azure-ad-setup-guides\">Learn more about Microsoft 365 wizards.<\/a><\/p>\n\n\n\n<p>Alternatively, you can also use the&nbsp;<a href=\"https:\/\/portal.office.com\/AdminPortal\/home?Q=Docs#\/azureadappintegration\">Enterprise App Configuration Wizard<\/a>. In this wizard, you can add an application to your tenant, add users\/groups to the app, assign roles, as well as walk through the SSO configuration as well. You can learn more about O365 wizards&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/admin\/misc\/azure-ad-setup-guides?view=o365-worldwide&amp;preserve-view=true\">here<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"configure-and-test-azure-ad-sso-for-fortigate-ssl-vpn\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#configure-and-test-azure-ad-sso-for-fortigate-ssl-vpn\"><\/a>Configure and test Azure AD SSO for FortiGate SSL VPN<\/h2>\n\n\n\n<p>You&#8217;ll configure and test Azure AD SSO with FortiGate SSL VPN by using a test user named B.Simon. For SSO to work, you need to establish a link relationship between an Azure AD user and the corresponding SAML SSO user group in FortiGate SSL VPN.<\/p>\n\n\n\n<p>To configure and test Azure AD SSO with FortiGate SSL VPN, you&#8217;ll complete these high-level steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#configure-azure-ad-sso\">Configure Azure AD SSO<\/a><\/strong>&nbsp;to enable the feature for your users.<ol><li><strong><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#create-an-azure-ad-test-user\">Create an Azure AD test user<\/a><\/strong>&nbsp;to test Azure AD single sign-on.<\/li><li><strong><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#grant-access-to-the-test-user\">Grant access to the test user<\/a><\/strong>&nbsp;to enable Azure AD single sign-on for that user.<\/li><\/ol><\/li><li><strong><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#configure-fortigate-ssl-vpn-sso\">Configure FortiGate SSL VPN SSO<\/a><\/strong>&nbsp;on the application side.<ol><li><strong>Create a FortiGate SAML SSO user group<\/strong>&nbsp;as a counterpart to the Azure AD representation of the user.<\/li><\/ol><\/li><li><strong><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#test-sso\">Test SSO<\/a><\/strong>&nbsp;to verify that the configuration works.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"configure-azure-ad-sso\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#configure-azure-ad-sso\"><\/a>Configure Azure AD SSO<\/h3>\n\n\n\n<p>Follow these steps to enable Azure AD SSO in the Azure portal:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>In the Azure portal, on the&nbsp;<strong>FortiGate SSL VPN<\/strong>&nbsp;application integration page, in the&nbsp;<strong>Manage<\/strong>&nbsp;section, select&nbsp;<strong>single sign-on<\/strong>.<\/li><li>On the&nbsp;<strong>Select a single sign-on method<\/strong>&nbsp;page, select&nbsp;<strong>SAML<\/strong>.<\/li><li>On the&nbsp;<strong>Set up Single Sign-On with SAML<\/strong>&nbsp;page, select the&nbsp;<strong>Edit<\/strong>&nbsp;button for&nbsp;<strong>Basic SAML Configuration<\/strong>&nbsp;to edit the settings:<img decoding=\"async\" src=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/media\/fortigate-ssl-vpn-tutorial\/saml-configuration.png\" alt=\"Screenshot of showing Basic SAML configuration page.\"><\/li><li>On the&nbsp;<strong>Set up Single Sign-On with SAML<\/strong>&nbsp;page, enter the following values:a. In the&nbsp;<strong>Identifier<\/strong>&nbsp;box, enter a URL in the pattern&nbsp;<code>https:\/\/&lt;FortiGate IP or FQDN address&gt;:&lt;Custom SSL VPN port&gt;\/remote\/saml\/metadata<\/code>.b. In the&nbsp;<strong>Reply URL<\/strong>&nbsp;box, enter a URL in the pattern&nbsp;<code>https:\/\/&lt;FortiGate IP or FQDN address&gt;:&lt;Custom SSL VPN port&gt;\/remote\/saml\/login<\/code>.c. In the&nbsp;<strong>Sign on URL<\/strong>&nbsp;box, enter a URL in the pattern&nbsp;<code>https:\/\/&lt;FortiGate IP or FQDN address&gt;:&lt;Custom SSL VPN port&gt;\/remote\/saml\/login<\/code>.d. In the&nbsp;<strong>Logout URL<\/strong>&nbsp;box, enter a URL in the pattern&nbsp;<code>https:\/\/&lt;FortiGate IP or FQDN address&gt;:&lt;Custom SSL VPN port&gt;&lt;FQDN&gt;\/remote\/saml\/logout<\/code>.&nbsp;NoteThese values are just patterns. You need to use the actual&nbsp;<strong>Sign on URL<\/strong>,&nbsp;<strong>Identifier<\/strong>,&nbsp;<strong>Reply URL<\/strong>, and&nbsp;<strong>Logout URL<\/strong>&nbsp;that is configured on the FortiGate.<\/li><li>The FortiGate SSL VPN application expects SAML assertions in a specific format, which requires you to add custom attribute mappings to the configuration. The following screenshot shows the list of default attributes.<img decoding=\"async\" src=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/media\/fortigate-ssl-vpn-tutorial\/claims.png\" alt=\"Screenshot of showing Attributes and Claims section.\"><\/li><li>The claims required by FortiGate SSL VPN are shown in the following table. The names of these claims must match the names used in the&nbsp;<strong>Perform FortiGate command-line configuration<\/strong>&nbsp;section of this tutorial. Names are case-sensitive.NameSource attributeusernameuser.userprincipalnamegroupuser.groupsTo create these additional claims:a. Next to&nbsp;<strong>User Attributes &amp; Claims<\/strong>, select&nbsp;<strong>Edit<\/strong>.b. Select&nbsp;<strong>Add new claim<\/strong>.c. For&nbsp;<strong>Name<\/strong>, enter&nbsp;<strong>username<\/strong>.d. For&nbsp;<strong>Source attribute<\/strong>, select&nbsp;<strong>user.userprincipalname<\/strong>.e. Select&nbsp;<strong>Save<\/strong>.&nbsp;Note<strong>User Attributes &amp; Claims<\/strong>&nbsp;allow only one group claim. To add a group claim, delete the existing group claim&nbsp;<strong>user.groups [SecurityGroup]<\/strong>&nbsp;already present in the claims to add the new claim or edit the existing one to&nbsp;<strong>All groups<\/strong>.f. Select&nbsp;<strong>Add a group claim<\/strong>.g. Select&nbsp;<strong>All groups<\/strong>.h. Under&nbsp;<strong>Advanced options<\/strong>, select the&nbsp;<strong>Customize the name of the group claim<\/strong>&nbsp;check box.i. For&nbsp;<strong>Name<\/strong>, enter&nbsp;<strong>group<\/strong>.j. Select&nbsp;<strong>Save<\/strong>.<\/li><li>On the&nbsp;<strong>Set up Single Sign-On with SAML<\/strong>&nbsp;page, in the&nbsp;<strong>SAML Signing Certificate<\/strong>&nbsp;section, select the&nbsp;<strong>Download<\/strong>&nbsp;link next to&nbsp;<strong>Certificate (Base64)<\/strong>&nbsp;to download the certificate and save it on your computer:<img decoding=\"async\" src=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/common\/certificatebase64.png\" alt=\"Screenshot that shows the certificate download link.\"><\/li><li>In the&nbsp;<strong>Set up FortiGate SSL VPN<\/strong>&nbsp;section, copy the appropriate URL or URLs, based on your requirements:<img decoding=\"async\" src=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/common\/copy-configuration-urls.png\" alt=\"Screenshot that shows the configuration URLs.\"><\/li><\/ol>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"create-an-azure-ad-test-user\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#create-an-azure-ad-test-user\"><\/a>Create an Azure AD test user<\/h4>\n\n\n\n<p>In this section, you&#8217;ll create a test user named B.Simon in the Azure portal.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>In the left pane of the Azure portal, select&nbsp;<strong>Azure Active Directory<\/strong>. Select&nbsp;<strong>Users<\/strong>, and then select&nbsp;<strong>All users<\/strong>.<\/li><li>Select&nbsp;<strong>New user<\/strong>&nbsp;at the top of the screen.<\/li><li>In the&nbsp;<strong>User<\/strong>&nbsp;properties, complete these steps:<ol><li>In the&nbsp;<strong>Name<\/strong>&nbsp;box, enter&nbsp;<strong>B.Simon<\/strong>.<\/li><li>In the&nbsp;<strong>User name<\/strong>&nbsp;box, enter &lt;username&gt;@&lt;companydomain&gt;.&lt;extension&gt;. For example,&nbsp;<code>B.Simon@contoso.com<\/code>.<\/li><li>Select&nbsp;<strong>Show password<\/strong>, and then write down the value that&#8217;s displayed in the&nbsp;<strong>Password<\/strong>&nbsp;box.<\/li><li>Select&nbsp;<strong>Create<\/strong>.<\/li><\/ol><\/li><\/ol>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"grant-access-to-the-test-user\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#grant-access-to-the-test-user\"><\/a>Grant access to the test user<\/h4>\n\n\n\n<p>In this section, you&#8217;ll enable B.Simon to use Azure single sign-on by granting that user access to FortiGate SSL VPN.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>In the Azure portal, select&nbsp;<strong>Enterprise applications<\/strong>, and then select&nbsp;<strong>All applications<\/strong>.<\/li><li>In the applications list, select&nbsp;<strong>FortiGate SSL VPN<\/strong>.<\/li><li>On the app&#8217;s overview page, in the&nbsp;<strong>Manage<\/strong>&nbsp;section, select&nbsp;<strong>Users and groups<\/strong>.<\/li><li>Select&nbsp;<strong>Add user<\/strong>, then select&nbsp;<strong>Users and groups<\/strong>&nbsp;in the&nbsp;<strong>Add Assignment<\/strong>&nbsp;dialog.<\/li><li>In the&nbsp;<strong>Users and groups<\/strong>&nbsp;dialog box, select&nbsp;<strong>B.Simon<\/strong>&nbsp;in the&nbsp;<strong>Users<\/strong>&nbsp;list, and then click the&nbsp;<strong>Select<\/strong>&nbsp;button at the bottom of the screen.<\/li><li>If you&#8217;re expecting any role value in the SAML assertion, in the&nbsp;<strong>Select Role<\/strong>&nbsp;dialog box, select the appropriate role for the user from the list. Click the&nbsp;<strong>Select<\/strong>&nbsp;button at the bottom of the screen.<\/li><li>In the&nbsp;<strong>Add Assignment<\/strong>&nbsp;dialog box, select&nbsp;<strong>Assign<\/strong>.<\/li><\/ol>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"create-a-security-group-for-the-test-user\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#create-a-security-group-for-the-test-user\"><\/a>Create a security group for the test user<\/h4>\n\n\n\n<p>In this section, you&#8217;ll create a security group in Azure Active Directory for the test user. FortiGate will use this security group to grant the user network access via the VPN.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>In the left pane of the Azure portal, select&nbsp;<strong>Azure Active Directory<\/strong>. Then select&nbsp;<strong>Groups<\/strong>.<\/li><li>Select&nbsp;<strong>New group<\/strong>&nbsp;at the top of the screen.<\/li><li>In the&nbsp;<strong>New Group<\/strong>&nbsp;properties, complete these steps:<ol><li>In the&nbsp;<strong>Group type<\/strong>&nbsp;list, select&nbsp;<strong>Security<\/strong>.<\/li><li>In the&nbsp;<strong>Group name<\/strong>&nbsp;box, enter&nbsp;<strong>FortiGateAccess<\/strong>.<\/li><li>In the&nbsp;<strong>Group description<\/strong>&nbsp;box, enter&nbsp;<strong>Group for granting FortiGate VPN access<\/strong>.<\/li><li>For the&nbsp;<strong>Azure AD roles can be assigned to the group (Preview)<\/strong>&nbsp;settings, select&nbsp;<strong>No<\/strong>.<\/li><li>In the&nbsp;<strong>Membership type<\/strong>&nbsp;box, select&nbsp;<strong>Assigned<\/strong>.<\/li><li>Under&nbsp;<strong>Members<\/strong>, select&nbsp;<strong>No members selected<\/strong>.<\/li><li>In the&nbsp;<strong>Users and groups<\/strong>&nbsp;dialog box, select&nbsp;<strong>B.Simon<\/strong>&nbsp;from the&nbsp;<strong>Users<\/strong>&nbsp;list, and then click the&nbsp;<strong>Select<\/strong>&nbsp;button at the bottom of the screen.<\/li><li>Select&nbsp;<strong>Create<\/strong>.<\/li><\/ol><\/li><li>After you&#8217;re back in the&nbsp;<strong>Groups<\/strong>&nbsp;section in Azure Active Directory, find the&nbsp;<strong>FortiGate Access<\/strong>&nbsp;group and note the&nbsp;<strong>Object Id<\/strong>. You&#8217;ll need it later.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"configure-fortigate-ssl-vpn-sso\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#configure-fortigate-ssl-vpn-sso\"><\/a>Configure FortiGate SSL VPN SSO<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"upload-the-base64-saml-certificate-to-the-fortigate-appliance\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#upload-the-base64-saml-certificate-to-the-fortigate-appliance\"><\/a>Upload the Base64 SAML Certificate to the FortiGate appliance<\/h4>\n\n\n\n<p>After you completed the SAML configuration of the FortiGate app in your tenant, you downloaded the Base64-encoded SAML certificate. You need to upload this certificate to the FortiGate appliance:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Sign in to the management portal of your FortiGate appliance.<\/li><li>In the left pane, select&nbsp;<strong>System<\/strong>.<\/li><li>Under&nbsp;<strong>System<\/strong>, select&nbsp;<strong>Certificates<\/strong>.<\/li><li>Select&nbsp;<strong>Import<\/strong>&nbsp;&gt;&nbsp;<strong>Remote Certificate<\/strong>.<\/li><li>Browse to the certificate downloaded from the FortiGate app deployment in the Azure tenant, select it, and then select&nbsp;<strong>OK<\/strong>.<\/li><\/ol>\n\n\n\n<p>After the certificate is uploaded, take note of its name under&nbsp;<strong>System<\/strong>&nbsp;&gt;&nbsp;<strong>Certificates<\/strong>&nbsp;&gt;&nbsp;<strong>Remote Certificate<\/strong>. By default, it will be named REMOTE_Cert_<em>N<\/em>, where&nbsp;<em>N<\/em>&nbsp;is an integer value.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"complete-fortigate-command-line-configuration\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#complete-fortigate-command-line-configuration\"><\/a>Complete FortiGate command-line configuration<\/h4>\n\n\n\n<p>Although you can configure SSO from the GUI since FortiOS 7.0, the CLI configurations apply to all versions and are therefore shown here.<\/p>\n\n\n\n<p>To complete these steps, you&#8217;ll need the values you recorded earlier:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>FortiGate SAML CLI setting<\/th><th>Equivalent Azure configuration<\/th><\/tr><\/thead><tbody><tr><td>SP entity ID (<code>entity-id<\/code>)<\/td><td>Identifier (Entity ID)<\/td><\/tr><tr><td>SP Single Sign-On URL (<code>single-sign-on-url<\/code>)<\/td><td>Reply URL (Assertion Consumer Service URL)<\/td><\/tr><tr><td>SP Single Logout URL (<code>single-logout-url<\/code>)<\/td><td>Logout URL<\/td><\/tr><tr><td>IdP Entity ID (<code>idp-entity-id<\/code>)<\/td><td>Azure AD Identifier<\/td><\/tr><tr><td>IdP Single Sign-On URL (<code>idp-single-sign-on-url<\/code>)<\/td><td>Azure Login URL<\/td><\/tr><tr><td>IdP Single Logout URL (<code>idp-single-logout-url<\/code>)<\/td><td>Azure Logout URL<\/td><\/tr><tr><td>IdP certificate (<code>idp-cert<\/code>)<\/td><td>Base64 SAML certificate name (REMOTE_Cert_N)<\/td><\/tr><tr><td>Username attribute (<code>user-name<\/code>)<\/td><td>username<\/td><\/tr><tr><td>Group name attribute (<code>group-name<\/code>)<\/td><td>group<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>&nbsp;Note<\/p>\n\n\n\n<p>The Sign on URL under Basic SAML Configuration is not used in the FortiGate configurations. It is used to trigger SP-initiated single sign on to redirect the user to the SSL VPN portal page.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Establish an SSH session to your FortiGate appliance, and sign in with a FortiGate Administrator account.<\/li><li>Run these commands and substitute the&nbsp;<code>&lt;values&gt;<\/code>&nbsp;with the information that you collected previously:ConsoleCopy<code>config user saml edit azure set cert &lt;FortiGate VPN Server Certificate Name&gt; set entity-id &lt; Identifier (Entity ID)Entity ID&gt; set single-sign-on-url &lt; Reply URL Reply URL&gt; set single-logout-url &lt;Logout URL&gt; set idp-entity-id &lt;Azure AD Identifier&gt; set idp-single-sign-on-url &lt;Azure Login URL&gt; set idp-single-logout-url &lt;Azure Logout URL&gt; set idp-cert &lt;Base64 SAML Certificate Name&gt; set user-name username set group-name group next end<\/code><\/li><\/ol>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"configure-fortigate-for-group-matching\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#configure-fortigate-for-group-matching\"><\/a>Configure FortiGate for group matching<\/h4>\n\n\n\n<p>In this section, you&#8217;ll configure FortiGate to recognize the Object ID of the security group that includes the test user. This configuration will allow FortiGate to make access decisions based on the group membership.<\/p>\n\n\n\n<p>To complete these steps, you&#8217;ll need the Object ID of the FortiGateAccess security group that you created earlier in this tutorial.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Establish an SSH session to your FortiGate appliance, and sign in with a FortiGate Administrator account.<\/li><li>Run these commands:ConsoleCopy<code>config user group edit FortiGateAccess set member azure config match edit 1 set server-name azure set group-name &lt;Object Id&gt; next end next end<\/code><\/li><\/ol>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"create-a-fortigate-vpn-portals-and-firewall-policy\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#create-a-fortigate-vpn-portals-and-firewall-policy\"><\/a>Create a FortiGate VPN Portals and Firewall Policy<\/h4>\n\n\n\n<p>In this section, you&#8217;ll configure a FortiGate VPN Portals and Firewall Policy that grants access to the FortiGateAccess security group you created earlier in this tutorial.<\/p>\n\n\n\n<p>Refer to&nbsp;<a href=\"https:\/\/docs.fortinet.com\/document\/fortigate-public-cloud\/7.0.0\/azure-administration-guide\/584456\/configuring-saml-sso-login-for-ssl-vpn-web-mode-with-azure-ad-acting-as-saml-idp\">Configuring SAML SSO login for SSL VPN with Azure AD acting as SAML IdP for instructions<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"test-sso\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#test-sso\"><\/a>Test SSO<\/h2>\n\n\n\n<p>In this section, you test your Azure AD single sign-on configuration with following options.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>In Step 5) of the Azure SSO configuration, *<em>Test single sign-on with your App<\/em>, click the&nbsp;<strong>Test<\/strong>&nbsp;button in the Azure portal. This will redirect to FortiGate VPN Sign-on URL where you can initiate the login flow.<\/li><li>Go to FortiGate VPN Sign-on URL directly and initiate the login flow from there.<\/li><li>You can use Microsoft My Apps. When you click the FortiGate VPN tile in the My Apps, this will redirect to FortiGate VPN Sign-on URL. For more information about the My Apps, see&nbsp;<a href=\"https:\/\/support.microsoft.com\/account-billing\/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510\">Introduction to the My Apps<\/a>.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"next-steps\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations#next-steps\"><\/a>Next steps<\/h2>\n\n\n\n<p>Once you configure FortiGate VPN you can enforce Session control, which protects exfiltration and infiltration of your organization\u2019s sensitive data in real time. Session control extends from Conditional Access.\u00a0<a href=\"https:\/\/learn.microsoft.com\/en-us\/cloud-app-security\/proxy-deployment-aad\">Learn how to enforce session control with Microsoft Defender for Cloud Apps<\/a>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Ref: <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/saas-apps\/fortigate-ssl-vpn-tutorial?source=recommendations\">Tutorial: Azure AD SSO integration with FortiGate SSL VPN &#8211; Microsoft Entra | Microsoft Learn<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this tutorial, you&#8217;ll learn how to integrate FortiGate SSL VPN with Azure Active Directory (Azure AD). When you integrate FortiGate SSL VPN with Azure AD, you can: Use Azure AD to control who can access FortiGate SSL VPN. Enable your users to be automatically signed in to FortiGate SSL VPN with their Azure AD <a class=\"read-more\" href=\"https:\/\/SUMMALAI.COM\/?p=4436\">Read More<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[238,13,239,9],"tags":[1379,1380],"class_list":["post-4436","post","type-post","status-publish","format-standard","hentry","category-cloud","category-firewalls","category-azure","category-networks","tag-azure-ad-sso-integration-with-fortigate-ssl-vpn","tag-fortigate-vpn-with-aad-sso"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=\/wp\/v2\/posts\/4436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4436"}],"version-history":[{"count":1,"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=\/wp\/v2\/posts\/4436\/revisions"}],"predecessor-version":[{"id":4437,"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=\/wp\/v2\/posts\/4436\/revisions\/4437"}],"wp:attachment":[{"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}