FortiClient / FortiGate - SSO Configuration

FortiClient / FortiGate - SSO Configuration

Alert
Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk.
Quote
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for FortiClient / FortiGate using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization
Warning
To set up Multi-Pass with  FortiClient / FortiGate, ensure you meet the following requirements:
-  FortiClient / FortiGate admin rights
      *Fortigate v7.x.x +
      *FortiClient v7.x.x +
      *FortiClient EMS v7.x.x + (Optional)
Configured user group ID from any IDP
- MPAS Admin rights
- Make sure that all users intended to use SSO inFortiClient / FortiGate are registered in your IdP and have the necessary permissions to access FortiClient / FortiGate.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.


FortiClient / FortiGate - SSO Configuration



Step 1 - Prepare FortiClient / FortiGate

Info
In order to make this configuration easier, we advice you to open two windows, one on your Multi-Pass Dashboard and the other on FortiClient / FortiGate admin console. it will allow you to copy and paste the different fields.

Prepare Multi-Pass


  • Go to your tenant, click on Integration then on Applications
  • Look for SAML in Custom Integration section
  • We will complete the form later in the documentation but if you scroll down you can see two option that we will need in the next steps: 
    • Tenant certificate
    • Tenant XML data
  • To get the metadata from MPAS, please click on "Download" under Tenant XML Data

    • You will need to provide the x.509 to FortiGate, on "tenant certificate" click on the button on the left of "Download" 
    • Select PEM and click on download.
    • Copy the x509 certificate string and save it as a .crt file in X.509 format.
    • Upload this certificate file to FortiGate.

    Configure FortiGate for SAML

    1. In FortiGate, go to System,
    2. Select Certificates.
    3. Select Create/Import, choose Remote Certificate, then upload the certificate from MPAS.
    4. Navigate to User & Authentication
    5. Single Sign-On and click Create New.
    6. Complete the form wiht the values listed below :
    SAML Service Provider Settings
    FieldValue
    TypeFortinet Product
    Entity IDhttps://ca.auth.kzero.com/tenant/<TENANT_NAME>
    Assertion Consumer URLhttps://ca.auth.kzero.com/tenant/<TENANT_NAME>/protocol/saml
    Single Logout URLhttps://ca.auth.kzero.com/tenant/<TENANT_NAME>/protocol/saml
    Attribute (Username)username
    Attribute (Groups)groups


    Configure User Group in FortiGate

    1. Go to User & Authentication
    2. Select User Groups and click Create New.
    3. Set type to Firewall.
    4. Click Add under Remote Groups.
    5. Select the SAML SSO provider you created earlier.
    6. Optionally specify a Group ID to restrict access.

    VPN Configuration

    1. Navigate to VPN → SSL-VPN Settings.
    2. Under Authentication/Portal Mapping, click Create New.
    3. Select the user group that includes your SSO provider.

    Info
    If FortiClient is managed by EMS
    • Make sure your deployment profile has these enabled in the Tunnel configuration:
      • Save username
      • Enable SAML login
      • Use external browser as user agent for SAML login
      • Redundant sort method = server
    Info
    If FortiClient is self-managed
    • Ensure the Use external browser option is selected.

    Step 2 - Configure Integration in Multi‑Pass

    1. Open Multi-Pass Dashboard
    2. On the left side, click on Integration, and select Applications
    3. Select Custom SAML integration
    1. Complete the form with the right values based on FortiGate information :
    FieldValue
    Client IDhttps://vpn.example.com/remote/saml/login
    Valid Redirect URIs (Assertion Consumer Service URL)https://vpn.example.com/remote/saml/login
    NameFor example "forticlient"
    DescriptionFor example "SSO integration Multi-Pass"
    NameID Formatusername


    1. Click on Add integration

    Finalize Advanced Settings in Multi‑Pass

    • Go to the Advanced Console and select the Client.

    • Search for your FortiClient integration and verify:
    General settings
    FieldValue
    Client IDhttps://vpn.example.com/remote/saml/login
    NameFortiClient
    DescriptionSSO integration
    Always display in UIOn

    Access settings
    FieldValue
    Home URLhttps://ca.auth.kzero.com/realms/Randintegration/protocol/saml/clients/forticlient
    Valid Redirect URIshttps://vpn.example.com/remote/saml/login
    Valid Post Logout Redirect URIshttps://vpn.example.com/remote/saml/login
    IDP-Initiated SSO URL Nameforticlient

    SAML capabilities
    FieldValue
    Name ID formatusername
    Force POST bindingOn
    Include AuthnStatementOn

    Signature and Encryption
    FieldValue
    Sign DocumentsOn
    Sign AssertionsOff
    1. Change to the tab Keys and make sure both parameters are OFF
    2. Go the advanced tab : 
      1. Assertion Consumer Service POST Binding URL = Valid Redirect URIs = https://vpn.example.com/remote/saml/login

    Client Scopes – Mappers

    1. Select the tab Client Scope

    1. Select your client 
    2. Create new mappers of type User Attribute:
      1. Username
    FieldValue
    Mapper Nameusername
    Mapper TypeUser Attribute
    User Attributeusername
    SAML Attribute Nameusername

      1. Groups
    FieldValue
    Mapper Namegroups
    Mapper TypeUser Attribute
    User Attributegroups
    SAML Attribute Namegroups



    Authentication Flow

    • Ensure Browser Flow is properly selected under Authentication Flow Overrides.

      • Related Articles

      • Wrike - SSO configuration

        This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Wrike using MPAS. SSO simplifies user authentication by allowing access to multiple ...
      • Intercom - SSO configuration

        Valid redirect URIs Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This ...
      • Lusha - SSO configuration

        Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
      • Huntress - SSO configuration

        This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Huntress using MPAS. SSO simplifies user authentication by allowing access to multiple ...
      • Rocket.chat - SSO configuration

        This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Rocket.chat using MPAS. SSO simplifies user authentication by allowing access to multiple ...