Skip to content

Commit d4e9567

Browse files
authored
Merge pull request #61666 from markreno/patch-2
Update fortigate-ssl-vpn-tutorial.md
2 parents 8025d5f + 5e8a397 commit d4e9567

File tree

1 file changed

+99
-8
lines changed

1 file changed

+99
-8
lines changed

articles/active-directory/saas-apps/fortigate-ssl-vpn-tutorial.md

Lines changed: 99 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -143,28 +143,119 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
143143
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
144144
1. In the **Add Assignment** dialog, click the **Assign** button.
145145

146+
### Create a security group for the test user
147+
148+
In this section, you'll create a security group in Azure Active Directory for the test user. This security group will be used by FortiGate to grant the user network access via the VPN.
149+
150+
1. From the left pane in the Azure portal, select **Azure Active Directory**, and then select **Groups**.
151+
1. Select **New group** at the top of the screen.
152+
1. In the **New Group** properties, follow these steps:
153+
1. In the **Group type** field, select **Security**.
154+
1. In the **Name** field, enter `FortiGateAccess`.
155+
1. In the **Group description** field, enter `Group for granting FortiGate VPN access`.
156+
1. For the **Azure AD roles can be assigned to the group (Preview)** settings, select **No**.
157+
1. In the **Membership type** field, select **Assigned**.
158+
1. Under **Members**, select **No members selected**.
159+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
160+
1. Select **Create**.
161+
1. Once you've been returned to the **Groups** blade in Azure Active Directory, locate the **FortiGate Access** group and take note of the **Object Id** for later use.
162+
146163
## Configure FortiGate SSL VPN SSO
147164

148-
To configure single sign-on on **FortiGate SSL VPN** side, please follow [this](https://aka.ms/AA9avum) document.
165+
### Upload the Base64 SAML Certificate to the FortiGate appliance
166+
167+
After completing the SAML configuration of the FortiGate app in your tenant, you downloaded the Base64 encoded SAML certificate. This must be uploaded to the FortiGate appliance:
168+
169+
1. Sign in to the management portal of your FortiGate appliance.
170+
1. In the left-hand menu, click **System**.
171+
1. Under **System**, click **Certificates**.
172+
1. Click **Import** -> **Remote Certificate**.
173+
1. Browse to the certificate downloaded from the FortiGate App deployment in the Azure tenant, select it, and click **OK**
174+
175+
After the certificate has uploaded, take note of its name under **System** > **Certificates** > **Remote Certificate**. By default, it will be named REMOTE_Cert_**N** where **N** is an integer value.
176+
177+
### Perform FortiGate command-line configuration
178+
179+
The following steps require the Azure logout URL to be configured. This URL contains a question mark (?). Special steps are required to submit this character successfully. The steps can't be performed from the FortiGate CLI Console. Instead, establish an SSH session to the FortiGate applicance using a tool like PuTTY. If your FortiGate appliance is an Azure virtual machine, you can perform the following steps from the Azure virtual machine serial console.
180+
181+
To perform these steps, you will need the values recorded earlier:
182+
183+
- Entity ID
184+
- Reply URL
185+
- Logout URL
186+
- Azure Login URL
187+
- Azure AD Identifier
188+
- Azure Logout URL
189+
- Base64 SAML Certificate Name (REMOTE_Cert_N)
190+
191+
1. Establish an SSH session to your FortiGate applicance and sign in with a FortiGate Administrator account.
192+
1. Perform the following commands:
149193

150-
> [!NOTE]
151-
> For more information to Configure FortiGate SSL VPN, refer [this](https://docs.fortinet.com/document/fortigate/6.4.0/new-features/558169/saml-sp-for-vpn-authentication) link.
194+
```console
195+
config user saml
196+
edit azure
197+
set entity-id <Entity ID>
198+
set single-sign-on-url <Reply URL>
199+
set single-logout-url <Logout URL>
200+
set idp-single-sign-on-url <Azure Login URL>
201+
set idp-entity-id <Azure AD Identifier>
202+
set idp-single-logout-url <Azure Logout URL>
203+
set idp-cert <Base64 SAML Certificate Name>
204+
set user-name username
205+
set group-name group
206+
end
152207

153-
### Create FortiGate SSL VPN test user
208+
```
154209

155-
In this section, you create a user called B.Simon in FortiGate SSL VPN. Work with [FortiGate SSL VPN support team](mailto:[email protected]) to add the users in the FortiGate SSL VPN platform. Users must be created and activated before you use single sign-on.
210+
> [!NOTE]
211+
> The **Azure Logout URL** contains a `?` character. You must enter a special key sequence to correctly provide the URL to the FortiGate serial console. The URL usually is `https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0`.
212+
>
213+
> To enter the Azure Logout URL in the serial console, enter `set idp-single-logout-url https://login.microsoftonline.com/common/wsfederation`.
214+
>
215+
> Then, select CTRL+V and paste the rest of the URL to complete the line: `set idp-single-logout-url https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0`.
156216
157-
## Test SSO
217+
### Configure FortiGate for Group Matching
218+
219+
In this section, you will configure FortiGate to recognize the Object Id of the Security Group in which the test user resides. This will allow FortiGate to make access decisions based on this group membership.
220+
221+
To perform these steps you will need the Object Id of the **FortiGateAccess** security group created earlier
222+
223+
1. Establish an SSH session to your FortiGate Applicance and sign-in with a FortiGate Administrator account.
224+
1. Perform the following commands:
225+
226+
```
227+
config user group
228+
edit FortiGateAccess
229+
set member azure
230+
config match
231+
edit 1
232+
set server-name azure
233+
set group-name <Object Id>
234+
next
235+
end
236+
next
237+
end
238+
```
239+
240+
### Create FortiGate VPN Portals and Firewall Policy
241+
242+
In this section, you configure FortiGate VPN Portals and Firewall Policy that grant access to the security group, **FortiGateAccess** created above.
243+
244+
Work with the [FortiGate support team](mailto:[email protected]) to add the VPN Portals and Firewall Policy to the FortiGate VPN platform. These steps must be complete before you use single sign-on.
245+
246+
## Test Single Sign-On
158247

159248
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
160249

161250
When you click the FortiGate SSL VPN tile in the Access Panel, you should be automatically signed in to the FortiGate SSL VPN for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
162251

252+
Microsoft and FortiGate recommend that you use the Fortinet VPN client, FortiClient for the best end user experience.
253+
163254
## Additional resources
164255

165-
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
256+
- [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
166257

167-
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
258+
- [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
168259

169260
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
170261

0 commit comments

Comments
 (0)