Skip to content

Commit 5e8a397

Browse files
authored
public repo edit
1 parent 8d57971 commit 5e8a397

File tree

1 file changed

+29
-41
lines changed

1 file changed

+29
-41
lines changed

articles/active-directory/saas-apps/fortigate-ssl-vpn-tutorial.md

Lines changed: 29 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -143,9 +143,9 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
143143
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
144144
1. In the **Add Assignment** dialog, click the **Assign** button.
145145

146-
### Create a Security Group for the test user
146+
### Create a security group for the test user
147147

148-
In this section, you'll create a Security Group in Azure Active Directory for the test user. This security group will be used by FortiGate to grant the user network access via the VPN.
148+
In this section, you'll create a security group in Azure Active Directory for the test user. This security group will be used by FortiGate to grant the user network access via the VPN.
149149

150150
1. From the left pane in the Azure portal, select **Azure Active Directory**, and then select **Groups**.
151151
1. Select **New group** at the top of the screen.
@@ -154,31 +154,31 @@ In this section, you'll create a Security Group in Azure Active Directory for th
154154
1. In the **Name** field, enter `FortiGateAccess`.
155155
1. In the **Group description** field, enter `Group for granting FortiGate VPN access`.
156156
1. For the **Azure AD roles can be assigned to the group (Preview)** settings, select **No**.
157-
1. In the **Membership type** field, select **Assigned**
158-
1. Under **Members** click **No members selected**
157+
1. In the **Membership type** field, select **Assigned**.
158+
1. Under **Members**, select **No members selected**.
159159
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
160-
1. Click **Create**
160+
1. Select **Create**.
161161
1. Once you've been returned to the **Groups** blade in Azure Active Directory, locate the **FortiGate Access** group and take note of the **Object Id** for later use.
162162

163163
## Configure FortiGate SSL VPN SSO
164164

165-
### Upload the Base64 SAML Certificate to the FortiGate Appliance
165+
### Upload the Base64 SAML Certificate to the FortiGate appliance
166166

167-
After completing the SAML configuration of the FortiGate App in your tenant, you downloaded the Base64 encoded SAML certificate. This must be uploaded to the FortiGate Appliance. To do so,
167+
After completing the SAML configuration of the FortiGate app in your tenant, you downloaded the Base64 encoded SAML certificate. This must be uploaded to the FortiGate appliance:
168168

169-
1. Sign-in to the management portal of your FortiGate Appliance
170-
1. In the left-hand menu, click **System**
171-
1. Under **System**, click **Certificates**
172-
1. Click **Import** -> **Remote Certificate**
173-
1. Browse to the certificate downloaded from the FortiGate App deployment in the Azure tenant, select it and click **OK**
169+
1. Sign in to the management portal of your FortiGate appliance.
170+
1. In the left-hand menu, click **System**.
171+
1. Under **System**, click **Certificates**.
172+
1. Click **Import** -> **Remote Certificate**.
173+
1. Browse to the certificate downloaded from the FortiGate App deployment in the Azure tenant, select it, and click **OK**
174174

175-
After the certificate has uploaded, take note of its name under **System** -> **Certificates** -> **Remote Certificate**. By default, it will be named REMOTE_Cert_**N** where **N** is an integer value
175+
After the certificate has uploaded, take note of its name under **System** > **Certificates** > **Remote Certificate**. By default, it will be named REMOTE_Cert_**N** where **N** is an integer value.
176176

177-
### Perform FortiGate Command Line Configuration
177+
### Perform FortiGate command-line configuration
178178

179-
The following steps requires the Azure Logout URL to be configured. This URL contains a question mark character (?). Special steps are required to submit this character successfully and they cannot be performed from the FortiGate CLI Console. Instead you will need to establish an SSH session to the FortiGate applicance using a tool like PuTTY. If your FortiGate appliance is an Azure Virtual Machine, you can perform the following steps from the Azure Virtual Machine Serial Console
179+
The following steps require the Azure logout URL to be configured. This URL contains a question mark (?). Special steps are required to submit this character successfully. The steps can't be performed from the FortiGate CLI Console. Instead, establish an SSH session to the FortiGate applicance using a tool like PuTTY. If your FortiGate appliance is an Azure virtual machine, you can perform the following steps from the Azure virtual machine serial console.
180180

181-
To perform these steps you will need the values recorded earlier
181+
To perform these steps, you will need the values recorded earlier:
182182

183183
- Entity ID
184184
- Reply URL
@@ -188,10 +188,10 @@ To perform these steps you will need the values recorded earlier
188188
- Azure Logout URL
189189
- Base64 SAML Certificate Name (REMOTE_Cert_N)
190190

191-
1. Establish an SSH session to your FortiGate Applicance and sign-in with a FortiGate Administrator account
192-
1. Perform the following commands -
191+
1. Establish an SSH session to your FortiGate applicance and sign in with a FortiGate Administrator account.
192+
1. Perform the following commands:
193193

194-
```
194+
```console
195195
config user saml
196196
edit azure
197197
set entity-id <Entity ID>
@@ -207,33 +207,21 @@ To perform these steps you will need the values recorded earlier
207207

208208
```
209209

210-
**NOTE:** The **Azure Logout URL** contains a ? character. This requires a special key sequence in order for it to be correctly provided to the FortiGate Serial Console. The URL is typically
211-
212-
```
213-
https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0
214-
```
215-
216-
To provide this in the Serial Console, proceed by typing
217-
218-
```
219-
set idp-single-logout-url https://login.microsoftonline.com/common/wsfederation
220-
```
221-
222-
Then type **CTRL+V**
223-
Then paste the rest of the URL in to complete the line
224-
225-
```
226-
set idp-single-logout-url https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0
227-
```
210+
> [!NOTE]
211+
> The **Azure Logout URL** contains a `?` character. You must enter a special key sequence to correctly provide the URL to the FortiGate serial console. The URL usually is `https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0`.
212+
>
213+
> To enter the Azure Logout URL in the serial console, enter `set idp-single-logout-url https://login.microsoftonline.com/common/wsfederation`.
214+
>
215+
> Then, select CTRL+V and paste the rest of the URL to complete the line: `set idp-single-logout-url https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0`.
228216
229217
### Configure FortiGate for Group Matching
230218

231219
In this section, you will configure FortiGate to recognize the Object Id of the Security Group in which the test user resides. This will allow FortiGate to make access decisions based on this group membership.
232220

233221
To perform these steps you will need the Object Id of the **FortiGateAccess** security group created earlier
234222

235-
1. Establish an SSH session to your FortiGate Applicance and sign-in with a FortiGate Administrator account
236-
1. Perform the following commands -
223+
1. Establish an SSH session to your FortiGate Applicance and sign-in with a FortiGate Administrator account.
224+
1. Perform the following commands:
237225

238226
```
239227
config user group
@@ -265,9 +253,9 @@ Microsoft and FortiGate recommend that you use the Fortinet VPN client, FortiCli
265253

266254
## Additional resources
267255

268-
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
256+
- [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
269257

270-
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
258+
- [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
271259

272260
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
273261

0 commit comments

Comments
 (0)