(V3.x) How do I Configure SAML2 Single Sign-on (Authentication) to use Active Directory Federated Services (ADFS) SSO?

Modified on Wed, 24 Sep at 7:50 AM

Follow the steps below to configure single sign-on with Active Directory Federated Services (ADFS): 


Fortinet Security Awareness and Training ServiceConfiguration


1)  On the left side menu, click Settings, then click Admin Settings

2)  Under Single Sign-On (SSO), click Edit SSO config

3)  Select Upload your identity provider metadata, then select Input metadata URL, then paste the AD FS metadata URL (https://<ADFSServerPublicURL>/federationmetadata/2007-06/federationmetadata.xml) into the IdP Metadata URL box.

4) Click the Add Fortinet as a SAML service provider (SP) section to expand it

5) Copy the value for Copy this SP Entity ID (service provider metadata) and take note of it (we'll need it later)

6) Click Continue

7) Under Configure your SAML attributes, configure the following:


Value
Attribute
emailEmail
firstnameFirst_Name
lastnameLast_name



8)  Click Continue

9)  Click Complete


Active Directory Federated Services (ADFS)


1)  Log into <Primary AD FS Server> and launch AD FS Management

2)  Right click Relying Party Trusts and click Add Relying Party Trust…

3)  On the Welcome screen, ensure Claims aware is selected, and click Start

4)  On the Select Data Source screen, ensure Import data about the relying party published online or on a local network is selected, and paste in the metadata URL of https://<tenant>.us.ftnt.info/saml2/<GUID>/metadata (this is the value we saved from earlier from the SP Entity ID field on the Fortinet SATS admin interface)

5) On the Specify Display Name screen, in the Display name field, enter in Fortinet Security Awareness Training v3.

6) On the Choose Access Control Policy screen, select your desired access policy, and click Next.

7) On the Ready to Add Trust screen, click Next

8) On the Finish screen, ensure Configure claims issuance policy for this application is checked, and click Close. 


The Edit Claim Issuance Policy window sometimes pops up behind the AD FS Management window.


10)  On the Edit Claim Issuance Policy window, click Add Rule

11)  On the Choose Rule Type screen, under Claim rule template, ensure Send LDAP Attributes as Claims is selected, and click Next

12)  On the Configure Claim Rule screen, set the following:


Claim rule name: Attributes

Attribute store: Active Directory


Note: When adding the Outgoing Claim Type in AD FS, if the claim isn't in the drop-down list exactly as required, you can type the claim name into the field manually.


LDAP Attribute mappings:


LDAP Attribute   | Outgoing Claim Type

E-Mail-Addresses | Email

Given-Name     | First_name

Surname         | Last_name

E-Mail-Addresses | Name ID


LDAP Attributes
Outgoing Claim Type
E-Mail-Addresses
Email
Given-NameFirst_name
SurnameLast_name
E-Mail-AddressesName ID


13)  Click Finish

14)  Click OK to exit the claim rules list.



Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article