You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/fortigate-ssl-vpn-tutorial.md
+64-3Lines changed: 64 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -145,10 +145,69 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
145
145
146
146
## Configure FortiGate SSL VPN SSO
147
147
148
-
To configure single sign-on on **FortiGate SSL VPN** side, please follow [this](https://aka.ms/AA9avum) document.
148
+
### Upload the Base64 SAML Certificate to the FortiGate Appliance
149
149
150
-
> [!NOTE]
151
-
> For more information to Configure FortiGate SSL VPN, refer [this](https://docs.fortinet.com/document/fortigate/6.4.0/new-features/558169/saml-sp-for-vpn-authentication) link.
150
+
After completing the SAML configuration of the FortiGate App in your tenant, you downloaded the Base64 encoded SAML certificate. This must be uploaded to the FortiGate Appliance. To do so,
151
+
152
+
1. Sign-in to the management portal of your FortiGate Appliance
153
+
1. In the left-hand menu, click **System**
154
+
1. Under **System**, click **Certificates**
155
+
1. Click **Import** -> **Remote Certificate**
156
+
1. Browse to the certificate downloaded from the FortiGate App deployment in the Azure tenant, select it and click **OK**
157
+
158
+
After the certificate has uploaded, take note of its name under **System** -> **Certificates** -> **Remote Certificate**. By default, it will be named REMOTE_Cert_**N** where **N** is an integer value
159
+
160
+
### Perform FortiGate Command Line Configuration
161
+
162
+
The following steps requires the Azure Logout URL to be configured. This URL contains a question mark character (?). Special steps are required to submit this character successfully and they cannot be performed from the FortiGate CLI Console. Instead you will need to establish an SSH session to the FortiGate applicance using a tool like PuTTY. If your FortiGate appliance is an Azure Virtual Machine, you can perform the following steps from the Azure Virtual Machine Serial Console
163
+
164
+
To perform these steps you will need the values recorded earlier
165
+
166
+
- Entity ID
167
+
- Reply URL
168
+
- Logout URL
169
+
- Azure Login URL
170
+
- Azure AD Identifier
171
+
- Azure Logout URL
172
+
- Base64 SAML Certificate Name (REMOTE_Cert_N)
173
+
174
+
1. Establish an SSH session to your FortiGate Applicance and sign-in with a FortiGate Administrator account
175
+
1. Perform the following commands -
176
+
177
+
```
178
+
config user saml
179
+
edit azure
180
+
set entity-id <Entity ID>
181
+
set single-sign-on-url <Reply URL>
182
+
set single-logout-url <Logout URL>
183
+
set idp-single-sign-on-url <Azure Login URL>
184
+
set idp-entity-id <Azure AD Identifier>
185
+
set idp-single-logout-url <Azure Logout URL>
186
+
set idp-cert <Base64 SAML Certificate Name>
187
+
set user-name username
188
+
set group-name group
189
+
end
190
+
191
+
```
192
+
193
+
**NOTE:** The **Azure Logout URL** contains a ? character. This requires a special key sequence in order for it to be correctly provided to the FortiGate Serial Console. The URL is typically
To provide this in the Serial Console, proceed by typing
200
+
201
+
```
202
+
set idp-single-logout-url https://login.microsoftonline.com/common/wsfederation
203
+
```
204
+
205
+
Then type **CTRL+V**
206
+
Then paste the rest of the URL in to complete the line
207
+
208
+
```
209
+
set idp-single-logout-url https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0
210
+
```
152
211
153
212
### Create FortiGate SSL VPN test user
154
213
@@ -160,6 +219,8 @@ In this section, you test your Azure AD single sign-on configuration using the A
160
219
161
220
When you click the FortiGate SSL VPN tile in the Access Panel, you should be automatically signed in to the FortiGate SSL VPN for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
162
221
222
+
Microsoft and FortiGate recommend that you use the Fortinet VPN client, FortiClient for the best end user experience.
223
+
163
224
## Additional resources
164
225
165
226
-[ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
0 commit comments