You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/fortigate-ssl-vpn-tutorial.md
+29-41Lines changed: 29 additions & 41 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -143,9 +143,9 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
143
143
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
144
144
1. In the **Add Assignment** dialog, click the **Assign** button.
145
145
146
-
### Create a Security Group for the test user
146
+
### Create a security group for the test user
147
147
148
-
In this section, you'll create a Security Group in Azure Active Directory for the test user. This security group will be used by FortiGate to grant the user network access via the VPN.
148
+
In this section, you'll create a security group in Azure Active Directory for the test user. This security group will be used by FortiGate to grant the user network access via the VPN.
149
149
150
150
1. From the left pane in the Azure portal, select **Azure Active Directory**, and then select **Groups**.
151
151
1. Select **New group** at the top of the screen.
@@ -154,31 +154,31 @@ In this section, you'll create a Security Group in Azure Active Directory for th
154
154
1. In the **Name** field, enter `FortiGateAccess`.
155
155
1. In the **Group description** field, enter `Group for granting FortiGate VPN access`.
156
156
1. For the **Azure AD roles can be assigned to the group (Preview)** settings, select **No**.
157
-
1. In the **Membership type** field, select **Assigned**
158
-
1. Under **Members** click**No members selected**
157
+
1. In the **Membership type** field, select **Assigned**.
158
+
1. Under **Members**, select**No members selected**.
159
159
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
160
-
1.Click**Create**
160
+
1.Select**Create**.
161
161
1. Once you've been returned to the **Groups** blade in Azure Active Directory, locate the **FortiGate Access** group and take note of the **Object Id** for later use.
162
162
163
163
## Configure FortiGate SSL VPN SSO
164
164
165
-
### Upload the Base64 SAML Certificate to the FortiGate Appliance
165
+
### Upload the Base64 SAML Certificate to the FortiGate appliance
166
166
167
-
After completing the SAML configuration of the FortiGate App in your tenant, you downloaded the Base64 encoded SAML certificate. This must be uploaded to the FortiGate Appliance. To do so,
167
+
After completing the SAML configuration of the FortiGate app in your tenant, you downloaded the Base64 encoded SAML certificate. This must be uploaded to the FortiGate appliance:
168
168
169
-
1. Sign-in to the management portal of your FortiGate Appliance
170
-
1. In the left-hand menu, click **System**
171
-
1. Under **System**, click **Certificates**
172
-
1. Click **Import** -> **Remote Certificate**
173
-
1. Browse to the certificate downloaded from the FortiGate App deployment in the Azure tenant, select it and click **OK**
169
+
1. Signin to the management portal of your FortiGate appliance.
170
+
1. In the left-hand menu, click **System**.
171
+
1. Under **System**, click **Certificates**.
172
+
1. Click **Import** -> **Remote Certificate**.
173
+
1. Browse to the certificate downloaded from the FortiGate App deployment in the Azure tenant, select it, and click **OK**
174
174
175
-
After the certificate has uploaded, take note of its name under **System**-> **Certificates**-> **Remote Certificate**. By default, it will be named REMOTE_Cert_**N** where **N** is an integer value
175
+
After the certificate has uploaded, take note of its name under **System** > **Certificates** > **Remote Certificate**. By default, it will be named REMOTE_Cert_**N** where **N** is an integer value.
176
176
177
-
### Perform FortiGate Command Line Configuration
177
+
### Perform FortiGate command-line configuration
178
178
179
-
The following steps requires the Azure Logout URL to be configured. This URL contains a question mark character (?). Special steps are required to submit this character successfully and they cannot be performed from the FortiGate CLI Console. Instead you will need to establish an SSH session to the FortiGate applicance using a tool like PuTTY. If your FortiGate appliance is an Azure Virtual Machine, you can perform the following steps from the Azure Virtual Machine Serial Console
179
+
The following steps require the Azure logout URL to be configured. This URL contains a question mark (?). Special steps are required to submit this character successfully. The steps can't be performed from the FortiGate CLI Console. Instead, establish an SSH session to the FortiGate applicance using a tool like PuTTY. If your FortiGate appliance is an Azure virtual machine, you can perform the following steps from the Azure virtual machine serial console.
180
180
181
-
To perform these steps you will need the values recorded earlier
181
+
To perform these steps, you will need the values recorded earlier:
182
182
183
183
- Entity ID
184
184
- Reply URL
@@ -188,10 +188,10 @@ To perform these steps you will need the values recorded earlier
188
188
- Azure Logout URL
189
189
- Base64 SAML Certificate Name (REMOTE_Cert_N)
190
190
191
-
1. Establish an SSH session to your FortiGate Applicance and sign-in with a FortiGate Administrator account
192
-
1. Perform the following commands -
191
+
1. Establish an SSH session to your FortiGate applicance and signin with a FortiGate Administrator account.
192
+
1. Perform the following commands:
193
193
194
-
```
194
+
```console
195
195
config user saml
196
196
edit azure
197
197
set entity-id <Entity ID>
@@ -207,33 +207,21 @@ To perform these steps you will need the values recorded earlier
207
207
208
208
```
209
209
210
-
**NOTE:** The **Azure Logout URL** contains a ? character. This requires a special key sequence in order for it to be correctly provided to the FortiGate Serial Console. The URL is typically
To provide this in the Serial Console, proceed by typing
217
-
218
-
```
219
-
set idp-single-logout-url https://login.microsoftonline.com/common/wsfederation
220
-
```
221
-
222
-
Then type **CTRL+V**
223
-
Then paste the rest of the URL in to complete the line
224
-
225
-
```
226
-
set idp-single-logout-url https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0
227
-
```
210
+
> [!NOTE]
211
+
> The **Azure Logout URL** contains a `?` character. You must enter a special key sequence to correctly provide the URL to the FortiGate serial console. The URL usually is `https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0`.
212
+
>
213
+
> To enter the Azure Logout URL in the serial console, enter `set idp-single-logout-url https://login.microsoftonline.com/common/wsfederation`.
214
+
>
215
+
> Then, select CTRL+V and paste the rest of the URL to complete the line: `set idp-single-logout-url https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0`.
228
216
229
217
### Configure FortiGate for Group Matching
230
218
231
219
In this section, you will configure FortiGate to recognize the Object Id of the Security Group in which the test user resides. This will allow FortiGate to make access decisions based on this group membership.
232
220
233
221
To perform these steps you will need the Object Id of the **FortiGateAccess** security group created earlier
234
222
235
-
1. Establish an SSH session to your FortiGate Applicance and sign-in with a FortiGate Administrator account
236
-
1. Perform the following commands -
223
+
1. Establish an SSH session to your FortiGate Applicance and sign-in with a FortiGate Administrator account.
224
+
1. Perform the following commands:
237
225
238
226
```
239
227
config user group
@@ -265,9 +253,9 @@ Microsoft and FortiGate recommend that you use the Fortinet VPN client, FortiCli
265
253
266
254
## Additional resources
267
255
268
-
-[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
256
+
-[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
269
257
270
-
-[What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
258
+
-[What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
271
259
272
260
-[What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
0 commit comments