Skip to content

Commit 8d57971

Browse files
author
Mark Renoden
authored
Update fortigate-ssl-vpn-tutorial.md
Added additional steps for configuring FortiGate
1 parent 4038c82 commit 8d57971

File tree

1 file changed

+44
-2
lines changed

1 file changed

+44
-2
lines changed

articles/active-directory/saas-apps/fortigate-ssl-vpn-tutorial.md

Lines changed: 44 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -143,6 +143,23 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
143143
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
144144
1. In the **Add Assignment** dialog, click the **Assign** button.
145145

146+
### Create a Security Group for the test user
147+
148+
In this section, you'll create a Security Group in Azure Active Directory for the test user. This security group will be used by FortiGate to grant the user network access via the VPN.
149+
150+
1. From the left pane in the Azure portal, select **Azure Active Directory**, and then select **Groups**.
151+
1. Select **New group** at the top of the screen.
152+
1. In the **New Group** properties, follow these steps:
153+
1. In the **Group type** field, select **Security**.
154+
1. In the **Name** field, enter `FortiGateAccess`.
155+
1. In the **Group description** field, enter `Group for granting FortiGate VPN access`.
156+
1. For the **Azure AD roles can be assigned to the group (Preview)** settings, select **No**.
157+
1. In the **Membership type** field, select **Assigned**
158+
1. Under **Members** click **No members selected**
159+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
160+
1. Click **Create**
161+
1. Once you've been returned to the **Groups** blade in Azure Active Directory, locate the **FortiGate Access** group and take note of the **Object Id** for later use.
162+
146163
## Configure FortiGate SSL VPN SSO
147164

148165
### Upload the Base64 SAML Certificate to the FortiGate Appliance
@@ -209,9 +226,34 @@ Then paste the rest of the URL in to complete the line
209226
set idp-single-logout-url https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0
210227
```
211228

212-
### Create FortiGate SSL VPN test user
229+
### Configure FortiGate for Group Matching
230+
231+
In this section, you will configure FortiGate to recognize the Object Id of the Security Group in which the test user resides. This will allow FortiGate to make access decisions based on this group membership.
232+
233+
To perform these steps you will need the Object Id of the **FortiGateAccess** security group created earlier
234+
235+
1. Establish an SSH session to your FortiGate Applicance and sign-in with a FortiGate Administrator account
236+
1. Perform the following commands -
237+
238+
```
239+
config user group
240+
edit FortiGateAccess
241+
set member azure
242+
config match
243+
edit 1
244+
set server-name azure
245+
set group-name <Object Id>
246+
next
247+
end
248+
next
249+
end
250+
```
251+
252+
### Create FortiGate VPN Portals and Firewall Policy
253+
254+
In this section, you configure FortiGate VPN Portals and Firewall Policy that grant access to the security group, **FortiGateAccess** created above.
213255

214-
In this section, you create a user called B.Simon in FortiGate SSL VPN. Work with [FortiGate SSL VPN support team](mailto:[email protected]) to add the users in the FortiGate SSL VPN platform. Users must be created and activated before you use single sign-on.
256+
Work with the [FortiGate support team](mailto:[email protected]) to add the VPN Portals and Firewall Policy to the FortiGate VPN platform. These steps must be complete before you use single sign-on.
215257

216258
## Test Single Sign-On
217259

0 commit comments

Comments
 (0)