You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/fortigate-ssl-vpn-tutorial.md
+99-8Lines changed: 99 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -143,28 +143,119 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
143
143
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
144
144
1. In the **Add Assignment** dialog, click the **Assign** button.
145
145
146
+
### Create a security group for the test user
147
+
148
+
In this section, you'll create a security group in Azure Active Directory for the test user. This security group will be used by FortiGate to grant the user network access via the VPN.
149
+
150
+
1. From the left pane in the Azure portal, select **Azure Active Directory**, and then select **Groups**.
151
+
1. Select **New group** at the top of the screen.
152
+
1. In the **New Group** properties, follow these steps:
153
+
1. In the **Group type** field, select **Security**.
154
+
1. In the **Name** field, enter `FortiGateAccess`.
155
+
1. In the **Group description** field, enter `Group for granting FortiGate VPN access`.
156
+
1. For the **Azure AD roles can be assigned to the group (Preview)** settings, select **No**.
157
+
1. In the **Membership type** field, select **Assigned**.
158
+
1. Under **Members**, select **No members selected**.
159
+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
160
+
1. Select **Create**.
161
+
1. Once you've been returned to the **Groups** blade in Azure Active Directory, locate the **FortiGate Access** group and take note of the **Object Id** for later use.
162
+
146
163
## Configure FortiGate SSL VPN SSO
147
164
148
-
To configure single sign-on on **FortiGate SSL VPN** side, please follow [this](https://aka.ms/AA9avum) document.
165
+
### Upload the Base64 SAML Certificate to the FortiGate appliance
166
+
167
+
After completing the SAML configuration of the FortiGate app in your tenant, you downloaded the Base64 encoded SAML certificate. This must be uploaded to the FortiGate appliance:
168
+
169
+
1. Sign in to the management portal of your FortiGate appliance.
170
+
1. In the left-hand menu, click **System**.
171
+
1. Under **System**, click **Certificates**.
172
+
1. Click **Import** -> **Remote Certificate**.
173
+
1. Browse to the certificate downloaded from the FortiGate App deployment in the Azure tenant, select it, and click **OK**
174
+
175
+
After the certificate has uploaded, take note of its name under **System** > **Certificates** > **Remote Certificate**. By default, it will be named REMOTE_Cert_**N** where **N** is an integer value.
176
+
177
+
### Perform FortiGate command-line configuration
178
+
179
+
The following steps require the Azure logout URL to be configured. This URL contains a question mark (?). Special steps are required to submit this character successfully. The steps can't be performed from the FortiGate CLI Console. Instead, establish an SSH session to the FortiGate applicance using a tool like PuTTY. If your FortiGate appliance is an Azure virtual machine, you can perform the following steps from the Azure virtual machine serial console.
180
+
181
+
To perform these steps, you will need the values recorded earlier:
182
+
183
+
- Entity ID
184
+
- Reply URL
185
+
- Logout URL
186
+
- Azure Login URL
187
+
- Azure AD Identifier
188
+
- Azure Logout URL
189
+
- Base64 SAML Certificate Name (REMOTE_Cert_N)
190
+
191
+
1. Establish an SSH session to your FortiGate applicance and sign in with a FortiGate Administrator account.
192
+
1. Perform the following commands:
149
193
150
-
> [!NOTE]
151
-
> For more information to Configure FortiGate SSL VPN, refer [this](https://docs.fortinet.com/document/fortigate/6.4.0/new-features/558169/saml-sp-for-vpn-authentication) link.
194
+
```console
195
+
config user saml
196
+
edit azure
197
+
set entity-id <Entity ID>
198
+
set single-sign-on-url <Reply URL>
199
+
set single-logout-url <Logout URL>
200
+
set idp-single-sign-on-url <Azure Login URL>
201
+
set idp-entity-id <Azure AD Identifier>
202
+
set idp-single-logout-url <Azure Logout URL>
203
+
set idp-cert <Base64 SAML Certificate Name>
204
+
set user-name username
205
+
set group-name group
206
+
end
152
207
153
-
### Create FortiGate SSL VPN test user
208
+
```
154
209
155
-
In this section, you create a user called B.Simon in FortiGate SSL VPN. Work with [FortiGate SSL VPN support team](mailto:[email protected]) to add the users in the FortiGate SSL VPN platform. Users must be created and activated before you use single sign-on.
210
+
> [!NOTE]
211
+
> The **Azure Logout URL** contains a `?` character. You must enter a special key sequence to correctly provide the URL to the FortiGate serial console. The URL usually is `https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0`.
212
+
>
213
+
> To enter the Azure Logout URL in the serial console, enter `set idp-single-logout-url https://login.microsoftonline.com/common/wsfederation`.
214
+
>
215
+
> Then, select CTRL+V and paste the rest of the URL to complete the line: `set idp-single-logout-url https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0`.
156
216
157
-
## Test SSO
217
+
### Configure FortiGate for Group Matching
218
+
219
+
In this section, you will configure FortiGate to recognize the Object Id of the Security Group in which the test user resides. This will allow FortiGate to make access decisions based on this group membership.
220
+
221
+
To perform these steps you will need the Object Id of the **FortiGateAccess** security group created earlier
222
+
223
+
1. Establish an SSH session to your FortiGate Applicance and sign-in with a FortiGate Administrator account.
224
+
1. Perform the following commands:
225
+
226
+
```
227
+
config user group
228
+
edit FortiGateAccess
229
+
set member azure
230
+
config match
231
+
edit 1
232
+
set server-name azure
233
+
set group-name <Object Id>
234
+
next
235
+
end
236
+
next
237
+
end
238
+
```
239
+
240
+
### Create FortiGate VPN Portals and Firewall Policy
241
+
242
+
In this section, you configure FortiGate VPN Portals and Firewall Policy that grant access to the security group, **FortiGateAccess** created above.
243
+
244
+
Work with the [FortiGate support team](mailto:[email protected]) to add the VPN Portals and Firewall Policy to the FortiGate VPN platform. These steps must be complete before you use single sign-on.
245
+
246
+
## Test Single Sign-On
158
247
159
248
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
160
249
161
250
When you click the FortiGate SSL VPN tile in the Access Panel, you should be automatically signed in to the FortiGate SSL VPN for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
162
251
252
+
Microsoft and FortiGate recommend that you use the Fortinet VPN client, FortiClient for the best end user experience.
253
+
163
254
## Additional resources
164
255
165
-
-[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
256
+
-[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
166
257
167
-
-[What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
258
+
-[What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
168
259
169
260
-[What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
0 commit comments