FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
athirat
Staff
Staff
Article Id 222360

Description

 

This article describes how to troubleshoot authentication failures due to 'clock skew' SAML errors.

 

Scope

 

FortiOS 7.0.4 and later.

 

Solution

 

  1. The SAML Assertion from SAML IDP is only valid for a specific duration which is declared in the 'Assertion'.

If the clock on  FortiGate  and SAML IDP is not in sync,  then this constraint will not be satisfied which causes the authentication to fail with the below errors in SAML debugs:

diag deb reset
diag debug console timestamp en
diagnose debug application samld -1
diag debug enable

 

__samld_sp_login_resp [859]: Clock skew tolerance: 0
__samld_sp_login_resp [864]: Clock skew issue.

 

  1. To fix this issue, make sure the time is in sync between FortiGate and the IDP.

     

     

  2. In some cases, where the time sync between the FortiGate and IDP can not be controlled, 'clock-tolerance' can be configured to control how many seconds can be the difference between SP (FortiGate) and IDP as below:

    config user saml 

        edit <>

            set clock-tolerance <in seconds>      <-- (0-300, 15 by default). 

        next

    end

     

  3. Verify the connection to the NTP server as well. Restart the NTP process and ensure FortiGate is in sync with the NTP server.

    To restart the NTP process:


    diagnose sys process pidof ntpd

     


    or:

    diag sys top-all | grep ntpd

    diag sys kill 11 <pid>  <-- Pid of the process.

     

    To check if FortiGate is getting a response from NTP:

     


    diag sniffer packet any "port 123" 4 0 l

     

Related article:

Technical Tip: Troubleshoot NTP synchronization issue