FortiAuthenticator - SSO configuration

This documentation has been tested and approved by Kelvin Zero's team

This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for FortiAuthenticator using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.

To set up Multi-Pass with FortiAuthenticator, ensure you meet the following requirements:
- FortiAuthenticator (FAC) Licensing
- MPAS Subscription
- Administrator rights on MPAS realm and FAC
instance
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.
Configuration of FortiAuthenticator
- Log in to your FortiAuthenticator admin console.
- Navigate to Authentication.
- Select SAML IdP.
- Click on Service Providers, click on Create New.
- Provide an SP Name:
- Enter mpas as the Service Provider name.
- Create an IdP Prefix:
- Click on the + icon next to the IdP prefix field.
- You can either generate a random prefix or create your own custom prefix.
- Once the prefix is set, click OK to confirm.
- Click on Save.
- Return to your Service Provider menu:
- Navigate back to the Service Provider menu in your FortiAuthenticator admin console.
- Confirm the IdP Prefix:
- Ensure that the correct IdP prefix is selected.
- Download Metadata:
- Scroll down and click on the IdP Metadata button to download the metadata XML file.
This XML file contains essential configuration details for integrating your Service Provider with the IdP.
- Navigate to your MPAS realm administrator console.
- Click on Identity Providers.
- Click on Add Provider.
- Select SAML v2.0.
This will begin the configuration process for integrating your SAML v2.0 identity provider.
- Optionally, provide an alternative alias.
- Set the display name to FortiAuthenticator.
- Turn off the User entity descriptor option.
- Click on Browse… to locate and upload the metadata file you just created.
- Scroll down and click on Add to complete the process.
This finalizes the configuration of your SAML v2.0 Identity Provider in MPAS.
- Once the IdP is added, open your IdP settings in MPAS.
- Click on the SAML 2.0 Service Provider Metadata link.
- This will display or download the metadata file for your Service Provider.
This metadata is essential for configuring and validating your SAML integration.
- Right-click on the page displaying the metadata.
- Select Save as.
- Save the file with an .xml file extension.
This ensures you have the metadata file stored locally for further configuration.
- Return to the FAC SAML IdP page.
- Click on Import SP Metadata.
- Upload the XML file you just saved.
- Click on OK to complete the process.
This finalizes the metadata import for your Service Provider configuration.
- Navigate to your MPAS account console:
- https://ca.auth.kzero.com/realms/<realm-name>/account
- Click on Try Another Way.
- Select FortiAuthenticator.
This will initiate the SAML-based login process using FortiAuthenticator.
- Enter your local realm user credentials in the designated fields.
- Click on Login to complete the authentication process.
This will allow you to verify the SSO integration using your local account credentials.
- Upon successful authentication, you will be redirected to MPAS.
- Click on Accept to agree to the terms and conditions.
- Fill out any missing requirements.
- Click on Save to complete the setup.

You have successfully used the FortiAuthenticator as an identity provider for Kelvin Zero’s Multi-Pass system (MPAS).
This confirms that your SAML integration is correctly configured and operational. Congratulations!
Related Articles
Datadog - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Datadog using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Trend Micro - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Trend Micro using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Zendesk - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Zendesk using MPAS. SSO simplifies user authentication by allowing access to multiple ...
BambooHR - SSO Configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Bamboo HR using MPAS. SSO simplifies user authentication by allowing access to multiple ...
HaloPSA - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for HaloPSA using MPAS. SSO simplifies user authentication by allowing access to multiple ...