Configure Fortigate SSL VPN to use Azure AD as SAML IDP (MFA / Conditional Access)

  Рет қаралды 108,752

GraniteDan

GraniteDan

Күн бұрын

Пікірлер: 127
@jaspreetmangat834
@jaspreetmangat834 2 жыл бұрын
One of the best fortigate SSL VPN integration with azure AD using SAML tutorial
@thom12345100
@thom12345100 Жыл бұрын
Thank you Dan! I was able to setup the same within 1.5 hours thanks to your vid. If anyone cares: If using FIDO2 key (passwordless), you have to select the option in the Forticlient VPN profile to authenticate using the browser.
@joshpark1
@joshpark1 2 жыл бұрын
I've been pouring over the config documents from both Azure and Fortigate side for about a week preparing to get it done this week. Always helpful to see someone actually do it though and I'm really happy you left the troubleshooting in there. Invaluable! Liked and subscribed sir, thank you!
@gustavovillanueva5306
@gustavovillanueva5306 Ай бұрын
When I was notice a 48 mins video about this theme, I said "sure it is so boring this video", but when I finish, I immediately pushed that suscribe and "I like" button. Thanks a lot for your video and explanation "una joyita de video"
@denmanfite3156
@denmanfite3156 2 жыл бұрын
Great video. Really enjoyed how you showed the whole process including the small issues you ran into.
@JamesNationMusic
@JamesNationMusic 5 ай бұрын
Dude thank you! One thing to note, is that you dont need the quotes anymore on 7.2.8 firmware.
@CrvTEC916
@CrvTEC916 3 жыл бұрын
Great, Thank you! This works out perfectly!! Multiple groups with different access and I was also able to configure access to go over a S2S VPN as well.
@GraniteDan
@GraniteDan 3 жыл бұрын
Glad it helped!
@wascarreyes01
@wascarreyes01 2 жыл бұрын
hey David how did you configure S2S vpn with SAML?
@attiland56
@attiland56 Жыл бұрын
Best content in the subject for months in the subject I have come across. Thank you
@stevencamacho4280
@stevencamacho4280 2 жыл бұрын
Top notch demonstration. I'll be implementing this soon and this video is a great resource to have.
@michaelramirez9378
@michaelramirez9378 Жыл бұрын
Thank you for creating this content Dan. Great video and instructions. It was incredibly helpful.
@_retrogamer999
@_retrogamer999 3 жыл бұрын
absolute genius. straight forward and easy to follow
@AmitKhandelwal23
@AmitKhandelwal23 2 жыл бұрын
Thanks a ton for the great Video. Each and every step in detail.
@GraniteDan
@GraniteDan 2 жыл бұрын
Very glad you found this helpful..
@sacoderch30
@sacoderch30 3 жыл бұрын
Great Video! I am using in version 6.2.9 too
@peterliu5296
@peterliu5296 2 жыл бұрын
great video. really informative .well organized and detailed. thanks for sharing. would like to see more upload from you.
@WReaume
@WReaume Жыл бұрын
Great vid. My free Azure account would not allow me to add groups to the FortigateSSL enterprise app thingy in Azure, only users. But, you could kick it a bit on the login and could evenutally get to the SSL portal. Thanks for the useful video and info. Make more vids!
@raulkamal9178
@raulkamal9178 2 жыл бұрын
Excellent video. Thanks for all your help!
@amiryousry
@amiryousry 3 жыл бұрын
I would like to thank you for this amazing video. Really helpful
@GraniteDan
@GraniteDan 3 жыл бұрын
I am very glad that you enjoyed it
@markb81
@markb81 3 жыл бұрын
Thanks for taking the time providing this great guide
@GraniteDan
@GraniteDan 3 жыл бұрын
My pleasure!
@billbaltas4674
@billbaltas4674 2 жыл бұрын
Thanks for posting this. This really helped me.
@eduarmoran
@eduarmoran 2 жыл бұрын
Excellent video Dan! thank you so much
@Spele10
@Spele10 3 жыл бұрын
Very good and useful video. Thank you very much
@GraniteDan
@GraniteDan 3 жыл бұрын
Glad it was helpful!
@asherxtn
@asherxtn 3 жыл бұрын
Thanks, great video. I was stuck when I forgot to add the new group to my existing policy, then I found your video at 29:06 strange that it wouldn't even let you sign in without a policy.
@abdallahezat8604
@abdallahezat8604 Жыл бұрын
great sharing.
@philipdefeo9586
@philipdefeo9586 3 жыл бұрын
This is great, thank you! Can you share the process for creating the SSL cert via Let's Encrypt?
@decosion5498
@decosion5498 9 ай бұрын
Very nice explanation
@jafrujafru
@jafrujafru 3 жыл бұрын
Very informative. Thankyou
@jorgegarcia-6981
@jorgegarcia-6981 2 жыл бұрын
excellent work, thank you very much!
@cloudmasterlive
@cloudmasterlive 2 жыл бұрын
Thank You for this video. It was a pleasure to watch. Just one question here. There was no prompt for MFA. How does that work? How can I set that up if I want my users to receive OTP/Notification to be able to connect to VPN? Please help.
@kichak99
@kichak99 2 жыл бұрын
Thanks great detailed video
@kwm1985
@kwm1985 4 ай бұрын
Thank you very much for this video. I had an issue with the step where I had to setup the custom "username" claim attribute on the Azure side and the documentation and other tutorials don't clearly state what to do there.
@garnetprince6199
@garnetprince6199 3 жыл бұрын
Awesome video, 100% :)
@nature0893
@nature0893 Жыл бұрын
Thank you for the video
@thisismeisthatyou2319
@thisismeisthatyou2319 3 жыл бұрын
Great tutorial :) Helped me understand a lot. 2 questions 1. In what case would you integrate this WITH Fortiauthenticator? 2. Can you use a private CA that all devices using the VPN have as a trusted CA, or must it be public?
@GraniteDan
@GraniteDan 3 жыл бұрын
Hey there, for the first question I am uncertain when you would integrate this with FortiAuthenticator. I don't use FortiAuthenticator, and wanted to set this up so that I could secure our remote access VPNs while maintaining a single MFA Provider and maximizing the benefits of our Azure AD subscription. As for your second question I expect that as long as your clients trust the certificate you are using on your Fortigate you should be able to use a private CA. I have not done this, but it would stand to reason that it should work.
@vinisantos.
@vinisantos. 3 жыл бұрын
One of the reasons you would integrate this with FortiAuthenticator is if you have multiple FortiGates in your environment for example. FortiAuthenticator can centralize all your users (And respective FortiTokens, if any) and provide the same kind of access to multiple devices in your network. Without a FAC in this scenario, you'd have to replicate the configuration to all FortiGates. And yes, you can use self-signed certificates just fine, they're just not as secure.
@nielstaildeman
@nielstaildeman 2 жыл бұрын
@@GraniteDan Is it possible to use the Azure saml as identity agent to use in policies? (Like FSSO enables with on prem AD?)
@ludapebe
@ludapebe 7 ай бұрын
Hi. I have a problem with the client . Log show a problem with connect to server error 6500
@la08
@la08 Жыл бұрын
Fantastic! one question: There seems to be a limitation on 7.0.9 to add multiple saml server to a group. Is there a way around this without recreating the same firewall policies for different saml servers
@GraniteDan
@GraniteDan Жыл бұрын
Add multiple groups to the firewall policy.
@la08
@la08 Жыл бұрын
@@GraniteDan Tried this, the issue is the same. Not able to add 2 different user groups(referencing two different saml server) to a firewall policy
@franckymetal
@franckymetal Жыл бұрын
Good morning Dan, really nice video and well explained. I was just wondering, in the ssl settings in the Authentication/ Portal Mapping if i create a mapping to a new portal for azure and I also have a mapping for a group of local user of fw to connect to the portal full-access for example. When my users with local account will connect to the fw via forticlient, will they get the azure windows also ? I would like to keep these users connecting without the azure portal but also that some groups gets azure windows.
@wanikatoon9614
@wanikatoon9614 3 жыл бұрын
Once we've integrated with Azure AD, I always need to enter a username and password? Can you make me remember the username after choose SAML login?
@lalitjoshi8032
@lalitjoshi8032 Жыл бұрын
Great Content...
@rajsyed729
@rajsyed729 2 жыл бұрын
Great work Dan, Is it possible to allow guest access to VPN? I am try to use Azure B2B cross tenant collaboration. Wants to allow guest accounts to authenticate using their own email addresses.
@Wickerdrummer
@Wickerdrummer 2 жыл бұрын
Hello, thank you for this video. I have a question: is the 7.0 required to use this feature or it works on 6.0? Can i use this type of authentication to grant internet access based on web filtering profile?
@dodonohoe30
@dodonohoe30 2 жыл бұрын
Great content Dan. For my understanding, I wonder could someone give me the highlevel sequence of events here, in terms if the token / authentication flow mechanism?
@عصامالعتيبي-ض9ك
@عصامالعتيبي-ض9ك 2 жыл бұрын
Do u have a video explaining integrating FG with adfs using SAML
@uligeitz5283
@uligeitz5283 3 жыл бұрын
Great Job!
@nimesis124
@nimesis124 2 жыл бұрын
Hi Dan, My forinet is running in AWS and I want to connect with Azure same like this video, Do I need to allow any ports in Azure and AWS vice versa?
@KhanhNguyen-fp8xs
@KhanhNguyen-fp8xs 3 жыл бұрын
Well done Dan :D
@PapaEnColere
@PapaEnColere 3 жыл бұрын
Thanks, I've been working on this since yesterday, and alway stuck in the same problem. When I do a "diagnose debug application sslvpn -1" on my Fortigate, I think the problem is right there: "[349:root:8f4]fsv_saml_login_response:477 No group info in SAML response.". I've recreate my claim, double (if not tripple) check my group IDs... but problem seems to be that no group information are sent from AzureAD.
@GraniteDan
@GraniteDan 3 жыл бұрын
It certainly sounds that way. Have you assigned groups to the application? If you would like we may be able to communicate directly over email to discuss your claim configuration etc. My email is dparr@granite-it.net.
@GraniteDan
@GraniteDan 3 жыл бұрын
As Per our email conversation I am pasting here to benefit the community. I have also added to the video description. No group info in SAML response: Azure Active Directory limits the number of groups it will emit in a token to 150 for SAML assertions, and 200 for JWT. If a user is a member of a larger number of groups, the groups are omitted and a link to the Graph endpoint to obtain group information is included instead.so, you need to use the option "groups assigned to the application" under User attributes and claims | add a group claim
@yhonattans.youngd.8454
@yhonattans.youngd.8454 3 жыл бұрын
Thanks you
@GraniteDan
@GraniteDan 3 жыл бұрын
No Problem. I looked for this solution for a long time. Once I got it working I had to share the solution with others.
@thenetworkarchitectchannel
@thenetworkarchitectchannel 3 жыл бұрын
GraniteDan, professionally done. I enjoyed watching. Do you have any thoughts on timer adjustments. I had heard when you go SAML that it is recommended to also adjust timers.
@GraniteDan
@GraniteDan 3 жыл бұрын
I the remote auth timeout to 90 seconds some time ago. It may have been a recommendation by Duo when we used them. It has worked well for us. I have also setup other environments with 60 second timeouts for remote auth with no manjor issue. It is really just buying time for folks to dig their phone out, and respond to MFA challenge.
@em7yn
@em7yn 2 жыл бұрын
Can this be done without running a domain for our SSL Cert? I.e, running a cert to our public IP? We have no internal DNS so setting this up would be difficult for FQDN.
@TheSuperscalar
@TheSuperscalar 3 жыл бұрын
SSLVPN Azure SAML support on Smart Device such as Mobile and Tablet?
@n2sport1
@n2sport1 Жыл бұрын
Do you need separate fortigate ssl vpn enterprise apps for separate fortigate firewalls?
@williamschubach5324
@williamschubach5324 3 жыл бұрын
On a FGT 40F I dont get a user found in the Azure Ad Group, how does one troubleshoot group translation? [215:root:2b]sslvpn_validate_user_group_list:1786 validating with SSL VPN authentication rules (1), realm ((null)). [215:root:2b]sslvpn_validate_user_group_list:1801 checking rule 1 cipher. [215:root:2b]sslvpn_validate_user_group_list:1809 checking rule 1 realm. [215:root:2b]sslvpn_validate_user_group_list:1820 checking rule 1 source intf. [215:root:2b]sslvpn_validate_user_group_list:1859 checking rule 1 vd source intf. [215:root:2b]sslvpn_validate_user_group_list:2178 rule 1 done, got user (0:0) group (1:0) peer group (0). [215:root:2b]sslvpn_validate_user_group_list:2506 got user (0:0), group (2:0) peer group (0). [215:root:2b]sslvpn_update_user_group_list:1734 got user (0:0), group (2:0), peer group (0) after update. [215:root:2b][fsv_found_saml_server_name_from_auth_lst:121] Found SAML server [ssl-azure-saml] in group [AAD-VPN_users] __samld_sp_create_auth_req [387]:
@sokocul
@sokocul 4 ай бұрын
thanks bro
@gdhomy2009
@gdhomy2009 5 ай бұрын
Where did you get gateway address to put in browser and Forticlient
@KK-po5hm
@KK-po5hm 2 жыл бұрын
Dan, Do you provide consulting services?
@d4nielcui
@d4nielcui Жыл бұрын
It's great tutorial. by the way, I found an error "Invalid HTTP request" when I tested. Could you advise, Dan? Thank you!
@grokit
@grokit 3 жыл бұрын
Hello Dan, great tutorial. If I'd enabled 2FA in Office 365 for those users, would that also work with the FortiVPN Client? That is, would I be able to setup 2FA without the need of an own radius server? Dan
@GraniteDan
@GraniteDan 3 жыл бұрын
Hello Grokit, Yes this is the beauty of setting up the Fortigate ssl vpn to use Azure AD MFA. Users get a seamless single sign-on experience. And the MFA solution extends to both application, as well as any other registered enterprise applications you setup in Azure AD.
@tommaor2094
@tommaor2094 Жыл бұрын
can i use self signed certificate for azure saml ?
@alfredosantos-es7002
@alfredosantos-es7002 2 жыл бұрын
Hello, Grate video and solution. I have 5 Windows domains and 5 Fortigates. All 5 AD's are synchronized with one MS365 Tenant. This solutions works in this architecture? Thanks in advanced. AS
@simabaptiste1133
@simabaptiste1133 2 жыл бұрын
It works, yes.
@forestbirdoriginals4917
@forestbirdoriginals4917 27 күн бұрын
Anybody else have the issue when using the FQDN instead of the IP, that the reply response from the FortiGate is empty? DNS seems to resolve to the right IP. Entra succeeds when using the IP in the application config, but when using a DNS address, it seems to fail after authenticating due to a empty response.
@robdax3122
@robdax3122 2 жыл бұрын
Hi Dan, this video is very helpful, but I missed the MFA part. If I am not wrong, you didn't configure it. I can see that the systen asked username and password, but not a second factor (multi-factor or two-factor) authentication. No token or OTP of any sort.
@GraniteDan
@GraniteDan 2 жыл бұрын
Rob, thanks I didn’t get into MFA other than maybe mentioning it. Azure AD handles the MFA side of things if you have MFA enabled either per user for via conditional access you will get prompted for MFA just like you would when logging into M365 or any other app.
@frietjesate6288
@frietjesate6288 3 жыл бұрын
My comprehension of client certificates is limited so bare with me. I have Azure SAML working thanks to your tutorial. Now I want to add client certificates to include company owned devices only. Is this possible? I've tried Azure Conditional Access with Hybrid Azure Joined devices restriction, but it does not seem supported in Forticlient (unsupported browser error). Is it just a matter of adding 'set ca' and 'set subject' to 'edit "ssl-azure-saml' ?
@GraniteDan
@GraniteDan 3 жыл бұрын
Sorry for the delay I am not sure if you have gotten to the bottom of this. The client certificates requirement is setup in the SSL VPN settings on the fortigate. I would check the documentation around using client certificates, but this article might also start you down the right road... packetplant.com/fortigate-ssl-vpn-and-2fa-using-certificate-and-username/
@pjassal79
@pjassal79 3 жыл бұрын
does this also work with ipsec?
@francoiscoulon2879
@francoiscoulon2879 3 жыл бұрын
Hello, several weeks I struggle to get it working... I have this famous "Invalid HTTP request" everytime I go the saml login URL. Tested almost everything, upgraded to 6.4.7.... any hint ?
@GraniteDan
@GraniteDan 3 жыл бұрын
Unfortunately I don't have much to go on there. What SAML Login URL do you mean, is it the Fortigate SSL VPN Web Portal or somewhere else?
@JanisJaunosans
@JanisJaunosans Жыл бұрын
noice!
@benj6675
@benj6675 2 жыл бұрын
When trying to import the remote certificate to the fortigate i get error "Basic constraints is absent for cert". Anyone else ever had that issue?
@elcioluizjunior
@elcioluizjunior 2 жыл бұрын
not working here, my vpn portal do not redirect do microsoft, if a access the saml address I have remote/saml/login invalid http request
@afdadfasfafdsa
@afdadfasfafdsa 3 жыл бұрын
About " **Note: It seems the Documentation from Fortinet has been taken down Please find this link to an alternate PDF copy of the doc (See pg 140): " please can you share the .pdf as the new link is not working ?
@GraniteDan
@GraniteDan 3 жыл бұрын
docs.fortinet.com/document/fortigate-public-cloud/6.4.0/azure-administration-guide/584456/configuring-saml-sso-login-for-ssl-vpn-web-mode-with-azure-ad-acting-as-saml-idp
@dondbg3751
@dondbg3751 3 жыл бұрын
thank you - is this supported only on ver 7.x ?
@GraniteDan
@GraniteDan 3 жыл бұрын
The Fortinet doc I used is from ver 6.2 I am not sure it it goes back any further than that. I only used 7.0 in my lab to be able to take advantage of the new features for Let's Encrypt certificates.
@dondbg3751
@dondbg3751 3 жыл бұрын
@@GraniteDan I had to use FAC to get this going - and MFA work as well...
@grokit
@grokit 3 жыл бұрын
@@dondbg3751 Hello Don, I am interested in the way you implemented 2FA. What does "FAC" mean? And do you have any kind of pointer to some more documentation? That would be great. Regards, Dan
@ferasawwad71
@ferasawwad71 3 жыл бұрын
Hello, do you have paid developer services? Are you a company
@nimesis124
@nimesis124 2 жыл бұрын
I am not able to import azure ad certificate in fortigate via remote certificate, I am using fortigate evaluation license
@GraniteDan
@GraniteDan 2 жыл бұрын
I do not know if this would be a limitation of the evaluation license or not. Validate you are downloading the correct version of the certificate. Do you get an error? Option not there?
@a2045125
@a2045125 3 жыл бұрын
Hi, could you please tell me how to modify the count down time when the login page appear, my login page have only 10s time. (In your video it is 60s)
@GraniteDan
@GraniteDan 3 жыл бұрын
From the Cli issue the following command config system global set remoteauthtimeout end
@a2045125
@a2045125 3 жыл бұрын
@@GraniteDan Thanks a lot! It works!
@arunlals1781
@arunlals1781 3 жыл бұрын
By using Azure AD Free license we can configure SAML to authenticate Fortigate SSL VPN?
@GraniteDan
@GraniteDan 3 жыл бұрын
I am fairly certain that you are able to setup 10 enterprise apps for sso with the free licnese so your Fortigate SSL VPN could be one of these. But I would strongly recommend that you validate that info with Microsoft. Here is some additional MS documentation: docs.microsoft.com/en-us/azure/active-directory/manage-apps/add-application-portal
@KhanhNguyen-fp8xs
@KhanhNguyen-fp8xs 3 жыл бұрын
Yes, you can. And with some advanced config on Azure, we can force user using VPN with passwordless. FIDO2 or Microsoft Authenticator by your own
@jdmarchand
@jdmarchand 3 жыл бұрын
not with a conditional access rule, it requires a P1 licence. It will work without it, but you wouldnt compliant.
@mehdit3300
@mehdit3300 3 жыл бұрын
@@jdmarchand how we could Force MFA without using Conditional access rule that required a P1 License?
@Heineken1712
@Heineken1712 2 жыл бұрын
Hi, does anyone know if you can apply Azure 2FA like this to authenticate against FG SSL VPN?
@GraniteDan
@GraniteDan 2 жыл бұрын
That is exactly what the video shows you how to do.
@Heineken1712
@Heineken1712 2 жыл бұрын
@@GraniteDan I only see azure authentication with username/password. But I'm new to azure, I probably don't fully understand the 2FA process of azure. Afaik you need to accept the 2FA f.e. on your phone. The login procedure on SSL VPN doesn't show a page where it is waiting for acceptance of the 2FA.
@GraniteDan
@GraniteDan 2 жыл бұрын
@@Heineken1712 MFA is wholly managed by Azure AD. When it is enabled either per user or by conditional access and you are authenticating with Azure AD via SAML the user will receive the MFA prompts just as they do when logging into Any Office 365 cloud apps etc.
@wascarreyes01
@wascarreyes01 2 жыл бұрын
How can I have redundancy with SAML?
@GraniteDan
@GraniteDan 2 жыл бұрын
What sort of redundancy are you looking for?
@wascarreyes01
@wascarreyes01 2 жыл бұрын
@@GraniteDan we have multiple interfaces configured on SSL VPN, the question really is, should I create two multiple instances in Azure AD as well?
@GraniteDan
@GraniteDan 2 жыл бұрын
@@wascarreyes01 I don't believe this would be required. If all of the users exist in the same Azure AD. Should be able to setup a Single server and then allow specific groups.
@wascarreyes01
@wascarreyes01 2 жыл бұрын
@@GraniteDan What if my firewall’s public IP goes down?
@GraniteDan
@GraniteDan 2 жыл бұрын
@@wascarreyes01 If your public IP goes down then your users probably won’t be able to connect to the SSL VPN. For that level of redundancy you could look at multiple connections, SDWAN, and some load balancing for the FQDN that users are connecting to.
@kento6909
@kento6909 Жыл бұрын
At about kzbin.info/www/bejne/pHWrY6qsq8p_qKs, you copied the FQDN but where should I get the FQDN in Fortigate from? Ive been trying to set up this configuration form yesterday but still stutcked on the way. Please help!! Kento from Japan.
@OmayioMicahKing
@OmayioMicahKing 3 жыл бұрын
@GraniteDan, what if iam using a different port other than 443 and also have some realms on my Fortigate i.e. my current remote gateway URL is: ...how do i configure SAML Basic Configuration URLS?
@GraniteDan
@GraniteDan 3 жыл бұрын
I don't have experience with realms etc with ssl VPN. I would recommend reviewing documentation and possible engaging support or your SE. If you get to the bottom of this please let the rest of us know.
@GraniteDan
@GraniteDan 3 жыл бұрын
Michah Today i was reviewing the release notes of Forticlient 7.0.1 and it seems to indicate that realms are not supported when using SAML authentication. Maybe next version...
FortiClient Remote SSL VPN with Azure/Azure MFA Authentication
15:39
Lamborghini vs Smoke 😱
00:38
Topper Guild
Рет қаралды 55 МЛН
黑天使只对C罗有感觉#short #angel #clown
00:39
Super Beauty team
Рет қаралды 19 МЛН
Players push long pins through a cardboard box attempting to pop the balloon!
00:31
How To Choose Mac N Cheese Date Night.. 🧀
00:58
Jojo Sim
Рет қаралды 114 МЛН
Configure and use 3rd Party threat feeds on a Fortigate Firewall
16:11
Fortinet | ZTNA - Better Secure Access to Applications for All Users
58:35
Switchshop - Network Specialists
Рет қаралды 18 М.
🔥FortiGate SSL VPN Two Factor Authentication (2FA)  - STEP BY STEP
12:00
IgoroTech Official
Рет қаралды 1,5 М.
Lamborghini vs Smoke 😱
00:38
Topper Guild
Рет қаралды 55 МЛН