This section describes how to integrate FortiGate SSL VPN with RSA Cloud Authentication Service using SAML Relying Party.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service.
Procedure
- In the RSA Cloud Authentication Service section, go to RSA Cloud Tenant Admin GUI > Authentication Clients > RADIUS > Add RADIUS Clients and Profiles.
- Enter the IP address.
- Enter the Shared Secret.
- Disable the Message Authenticator attribute checkbox, as FortiGate doesn’t send authentication request with this attribute.
Note: Enter the rest of the configuration according to the required set up.
Configuration is complete.
Configure FortiGate VPN SSL using SAML Relying Party.
Perform these steps to configure RSA Cloud Authentication Service using SAML Relying Party.
Procedure
- Log in to the RSA Cloud Console > Authentication Clients > Relying Parties > Add a Relying Party > Service Provider.
- In the Authentication Section, select SecurID manages all authentication.
- In the Connection Profile section, enter the URL in following format.
Note: The port can be different according to the configuration on the FortiGate, Access the FortiGate GUI > VPN > SSL-VPN Settings and check Listen on Port section to verify it.
- In the Service Provider section, enter the following information.
-
- ACS URL: https://<FQDN or IP>:<SSLVPN port>/remote/saml/login/
- Service Provider Entity ID: https://<FQDN or IP>:<SSLVPN port>/remote/saml/metadata/
- In the Message Protection section, select to validate the SAML Request Signature.
- Select the certificate used by FortiGate for signing, which can be obtained directly from FortiGate.
Note: If the certificate & key are uploaded or you want to use an existing certificate & key, access the FortiGate GUI > System > Certificates > Local Certificate and then download this certificate to import it into the RSA Cloud Console.
- In the SAML Response Protection section, you can select either to sign the SAML Assertion only or the entire SAML Response.
- In the User Identity section, enter the Identifier type as unspecified and map it to mail / userPrincipalName / sAMAccountName . Also, you must return Assertion Attribute username which will be mapped to mail / userPrincipalName / sAMAccountName. Send the groups the users are part of by sending the attribute named group which maps to virtualGroups.
- Access the FortiGate via GUI and import the certificate retrieved from RSA Cloud Console to validate RSA SAML Response Signature.
-
- Import Certificated fetched from RSA Cloud Console, go to System > Certificates > Create/Import then select Remote Certificate and click OK.
- Upload a certificate/key which will be used by FortiGate to sign the SAML Requests, you are required to use the existing self-signed certificates or automatically provision.
- Upload (PKCS12 format files or Certificate + Private key) or generate a CSR depending on your setup in the following format:
- Go to System > Certificates > Create/Import > Certificate.
- Click Import Certificate , then select either PKCS12 or Certificate + Key File in the following example:
PKCS12 Example:
- Click Create.
Certificate + Key Files Example:
- Import certificate in the RSA Cloud Console.
- Access the FortiGate via CLI and perform the following steps.
- FEIRDUFG02 # config user saml
- FEIRDUFG02 (saml) # edit RSA_SecurID_Relying_Party
- new entry 'RSA_SecurID_Relying_Party' added
- FEIRDUFG02 (RSA_SecurID_Rely~rty) # set cert “This is the Certificate Name for the Fortigate to sign SAML Request”
- FEIRDUFG02 (RSA_SecurID_Rely~rty) # set entity-id https://<FQDN or IP>:<SSLVPN port>/remote/saml/metadata/
- FEIRDUFG02 (RSA_SecurID_Rely~rty) # set single-sign-on-url https://<FQDN or IP>:<SSLVPN port>/remote/saml/login/
- FEIRDUFG02 (RSA_SecurID_Rely~rty) # set single-logout-url https://<FQDN or IP>:<SSLVPN port>/remote/saml/logout/
- FEIRDUFG02 (RSA_SecurID_Rely~rty) # set idp-entity-id “This is the RSA SSO URL”
- FEIRDUFG02 (RSA_SecurID_Rely~rty) # set idp-single-sign-on-url “This is the RSA SSO URL”
- FEIRDUFG02 (RSA_SecurID_Rely~rty) # set idp-cert “This is the Certificate name for validating RSA SAML Response”
- FEIRDUFG02 (RSA_SecurID_Rely~rty) # set user-name username
- FEIRDUFG02 (RSA_SecurID_Rely~rty) # set group-name group
- FEIRDUFG02 (RSA_SecurID_Rely~rty) # end
Notes:
- FEIRDUFG02 (RSA_SecurID_Rely~rty) # set cert saml_sign.pem > This is the certificate that the FortiGate will use to sign the SAML Request.
- FEIRDUFG02 (RSA_SecurID_Rely~rty) # set idp-cert REMOTE_Cert_2 >This is the certificate that the FortiGate will use to verify the RSA SAML Response Signature.
- RSA SSO URL:- Both IdP-single-sign-on-url and IdP-entity-id are the same and can be fetched from the RSA Cloud Console > Authentication Clients > Relying Party > Your Application Name > Connection Profile.
- To retrieve the SSL VPN port.
Sample Configuration:-
config user saml
edit "RSA_SecurID"
set cert "test-lab"
set entity-id "https://192.168.61.250:10443/remote/saml/metadata/"
set single-sign-on-url "https://192.168.61.250:10443/remote/saml/login/"
set single-logout-url "https://192.168.61.250:10443/remote/saml/logout/"
set idp-entity-id " https://gs149.auth-demo.securid.com/saml-fe/sso/sslvpn "
set idp-single-sign-on-url " https://gs149.auth-demo.securid.com/saml-fe/sso/sslvpn "
set idp-cert "REMOTE_Cert_3"
set user-name "username"
set group-name "group"
set digest-method sha1
next
end
- In order for SAML Flow to start & work, you need to configure a rule where you will have a User group that has SAML Server as an Authentication Server for it. You can start by going to Fortigate GUI > User & Authentication > User Groups.
Note: You can match the returned group from RSA Cloud by clicking on the Remote Server above and specify the group you want to match, otherwise FortiGate will accept all groups by default.
- Go to Policy & Objects > Create New to Configure a Policy.
- In the Source section, select the group that was created previously.
- Go to VPN > SSL-VPN Settings > Authentication/Portal Mapping.
Note: Ensure using FortiClient VPN, the mentioned group above is mapped to the Tunnel Mode. By default, the full-access portal has both Tunnel-Mode and Web Mode enabled.
- Design specific groups access Tunnel-Mode which used FortClient and other groups to access only the Web-Mode.
Configuration is complete.
Return to the main page.
Related Articles
FortiGate Firewall - SAML My Page SSO Configuration Using SSL VPN - RSA Ready Implementation Guide 18Number of Views FortiGate Firewall - RADIUS Configuration Using SSL VPN - RSA Ready Implementation Guide 79Number of Views FortiGate Firewall - SAML IDR SSO Configuration Using SSL VPN - RSA Ready Implementation Guide 46Number of Views FortiGate Firewall - Configure RADIUS Authentication Manager Using SSL VPN - RSA Ready Implementation Guide 102Number of Views FortiGate Firewall - SAML My Page SSO Configuration Using Admin Access UI - RSA Ready Implementation Guide 54Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x