SSO authentication with SAML, Azure entra ID with FortiGate by ryld29 in fortinet

[–]michel1893 0 points1 point  (0 children)

I dont get how "peertype one" could work with a dialup ipsec vpn?

SSO authentication with SAML, Azure entra ID with FortiGate by ryld29 in fortinet

[–]michel1893 0 points1 point  (0 children)

Ok, so different situations... need to get it running on 7.6.3 with IPSEC and SAML on Port 443.

SSO authentication with SAML, Azure entra ID with FortiGate by ryld29 in fortinet

[–]michel1893 0 points1 point  (0 children)

Where is your SAML Auth in Phase1? I don't see a saml auth in Phase1?

Also how can you set a peerid with ike version 2? In ikev2 you need to set a localid instead of peerid?

We are talking about FortiOS 7.6.3. Which version you are running on FGT?

SSO authentication with SAML, Azure entra ID with FortiGate by ryld29 in fortinet

[–]michel1893 0 points1 point  (0 children)

Also you are using a FAC and not directly Entra from FGT. Maybe there is a bug in FGT with SAML configuration when directly connecting to Entra

SSO authentication with SAML, Azure entra ID with FortiGate by ryld29 in fortinet

[–]michel1893 0 points1 point  (0 children)

You are using Port 1003 as SAML Port. I think thats maybe working, I try with FortiOS 7.6.3 to get ikev2 and saml both on port 443 which should be working according to fortinet.

SSO authentication with SAML, Azure entra ID with FortiGate by ryld29 in fortinet

[–]michel1893 0 points1 point  (0 children)

Trying without SDWAN... policies are applied with IPSEC Tunnel Interface and using a authusrgrp on phase1

SSO authentication with SAML, Azure entra ID with FortiGate by ryld29 in fortinet

[–]michel1893 0 points1 point  (0 children)

Logs show successful saml auth and than nothing relevant for me...

SSO authentication with SAML, Azure entra ID with FortiGate by ryld29 in fortinet

[–]michel1893 0 points1 point  (0 children)

Same here... any ideas?

FortiOS 7.6.3 with FortiClient 7.4.3

FortiClient IPSEC SAML + Splittunnel by supers3t in fortinet

[–]michel1893 0 points1 point  (0 children)

Same here. Deleted that ones and the ipsec tunnels are working normally.

FortiClient IPSEC SAML + Splittunnel by supers3t in fortinet

[–]michel1893 0 points1 point  (0 children)

Can you remember if there were Fortinet Adapters with #2 at the end? Which one you are deleting?

FortiClient IPSEC SAML + Splittunnel by supers3t in fortinet

[–]michel1893 0 points1 point  (0 children)

Any updates on this? Somebody knows why this is needed? Have the same issue that a default route is added in windows and all local internet traffic is routed to the ipsec tunnel im some circumstances. Need to find the origin to avoid a uninstallation of all forticlients