You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/fortigate-ssl-vpn-tutorial.md
+44-2Lines changed: 44 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -143,6 +143,23 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
143
143
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
144
144
1. In the **Add Assignment** dialog, click the **Assign** button.
145
145
146
+
### Create a Security Group for the test user
147
+
148
+
In this section, you'll create a Security Group in Azure Active Directory for the test user. This security group will be used by FortiGate to grant the user network access via the VPN.
149
+
150
+
1. From the left pane in the Azure portal, select **Azure Active Directory**, and then select **Groups**.
151
+
1. Select **New group** at the top of the screen.
152
+
1. In the **New Group** properties, follow these steps:
153
+
1. In the **Group type** field, select **Security**.
154
+
1. In the **Name** field, enter `FortiGateAccess`.
155
+
1. In the **Group description** field, enter `Group for granting FortiGate VPN access`.
156
+
1. For the **Azure AD roles can be assigned to the group (Preview)** settings, select **No**.
157
+
1. In the **Membership type** field, select **Assigned**
158
+
1. Under **Members** click **No members selected**
159
+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
160
+
1. Click **Create**
161
+
1. Once you've been returned to the **Groups** blade in Azure Active Directory, locate the **FortiGate Access** group and take note of the **Object Id** for later use.
162
+
146
163
## Configure FortiGate SSL VPN SSO
147
164
148
165
### Upload the Base64 SAML Certificate to the FortiGate Appliance
@@ -209,9 +226,34 @@ Then paste the rest of the URL in to complete the line
209
226
set idp-single-logout-url https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0
210
227
```
211
228
212
-
### Create FortiGate SSL VPN test user
229
+
### Configure FortiGate for Group Matching
230
+
231
+
In this section, you will configure FortiGate to recognize the Object Id of the Security Group in which the test user resides. This will allow FortiGate to make access decisions based on this group membership.
232
+
233
+
To perform these steps you will need the Object Id of the **FortiGateAccess** security group created earlier
234
+
235
+
1. Establish an SSH session to your FortiGate Applicance and sign-in with a FortiGate Administrator account
236
+
1. Perform the following commands -
237
+
238
+
```
239
+
config user group
240
+
edit FortiGateAccess
241
+
set member azure
242
+
config match
243
+
edit 1
244
+
set server-name azure
245
+
set group-name <Object Id>
246
+
next
247
+
end
248
+
next
249
+
end
250
+
```
251
+
252
+
### Create FortiGate VPN Portals and Firewall Policy
253
+
254
+
In this section, you configure FortiGate VPN Portals and Firewall Policy that grant access to the security group, **FortiGateAccess** created above.
213
255
214
-
In this section, you create a user called B.Simon in FortiGate SSL VPN. Work with [FortiGate SSL VPN support team](mailto:[email protected]) to add the users in the FortiGate SSL VPN platform. Users must be created and activated before you use single sign-on.
256
+
Work with the[FortiGate support team](mailto:[email protected]) to add the VPN Portals and Firewall Policy to the FortiGate VPN platform. These steps must be complete before you use single sign-on.
0 commit comments