FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
syadav
Staff
Staff
Article Id 281910
Description

 

This article describes the use of multiple Service Providers on a single Azure enterprise application for SAML Administrator login.

 

Scope

 

FortiGate.

 

Solution

 

Azure enterprise application gives the option to use multiple Identifier (Entity ID) and Reply URLs (Assertion Consumer Service URL) for SAML SSO.

Administrators can log in to different FortiGates via SAML administrator SSO login using a single Azure application.

 

To create a new enterprise Azure application, please follow this guide:
Technical Tip: Configuring SAML SSO login for FortiGate administrators with Azure AD acting as SAML ...

 

Follow the below steps to configure the Azure enterprise application with multiple service providers:

  • Login to Azure portal -> Microsoft Entra ID (formerly known as Azure Active Directory).
  • Select Enterprise applications then select the Enterprise application.
  • Select Setup single sign-on then click Edit on Basic SAML configuration.
  • Under Identifier (Entity ID) add the entity-id URL of both FortiGates and Select Add an identifier if more than two FortiGates are used.

 

syadav_0-1698690126410.png

 

  • Under Reply URL (Assertion Consumer Service URL) add the single-sign-on URL of both FortiGates and select Add reply URL if more than two FortiGates are required.

 

syadav_1-1698690126412.png

 

  • A single sign-on URL is mandatory in the gallery application and optional in the non-gallery application.
    • The screenshot below shows the Single sign-on URL as mandatory in a gallery application:

 

syadav_2-1698690126413.png

 

  • The screenshot below shows the Single sign-on URL as optional in a non-gallery application:

 

syadav_3-1698690126414.png

 

  • For gallery applications, this can be any URL, and for non-gallery applications leave it blank.

 

A Gallery application can be found in the Entra gallery catalog, as shown below:

 

syadav_4-1698690126415.png


A non-gallery application can be created by selecting 'Create your own application':

 

syadav_5-1698690126416.png

 

Then select the option shown below which will create a non-gallery application:

 

syadav_6-1698690126417.png

 

Configuration of the FortiGate would be the same except for their local entity-id, which will have the FortiGate’s FQDN or IP address.


System SAML configuration on Home FortiGate:

 

config system saml

    set status enable

    set default-profile "super_admin"

    set cert "Fortinet_Factory"

    set entity-id "https://10.0.0.254/metadata"

    set idp-entity-id "https://sts.windows.net/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/"

    set idp-single-sign-on-url "https://login.microsoftonline.com/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/saml2"

    set idp-single-logout-url "https://login.microsoftonline.com/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/saml2"

    set idp-cert "REMOTE_Cert_4"

    set server-address "10.0.0.254"

end

 

System SAML configuration on Office FortiGate:

 

config system saml

    set status enable

    set default-profile "super_admin"

    set cert "Fortinet_Factory"

    set entity-id "https://10.0.0.253/metadata"

    set idp-entity-id "https://sts.windows.net/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/"

    set idp-single-sign-on-url "https://login.microsoftonline.com/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/saml2"

    set idp-single-logout-url "https://login.microsoftonline.com/347b5a44-8e8a-4062-b9b9-c9c7edd2bbaf/saml2"

    set idp-cert "REMOTE_Cert_5"

    set server-address "10.0.0.253"

end

 

Administrators can now log in to multiple FortiGates using Azure SAML SSO authentication.

Related article:
Technical Tip: Using a single Azure Enterprise Application for multiple SAML Service Providers (SPs)...

Contributors