website/integrations/networking/fortigate-ssl/index.md
FortiGate is a firewall from Fortinet. It is an NGFW with layer 7 inspection and can become part of a Fortinet security fabric.
-- https://www.fortinet.com/products/next-generation-firewall
The following placeholders are used in this guide:
authentik.company is the FQDN of your authentik installation.fortigate.company is the FQDN of your FortiGate firewall.:::info This documentation lists only the settings that you need to change from their default values. Be aware that any changes other than those explicitly mentioned in this guide could cause issues accessing your application. :::
To support the integration of FortiGate SSLVPN with authentik, you need to create an application/provider pair and user group in authentik.
https://fortigate.company/remote/saml/login.http://fortigate.company/remote/saml/metadata/.minutes=5.minutes=5.sha256.sha256./data/config/config.conf. Copy and paste the following configuration, replacing the placeholders with your values:config user saml
edit "authentik-sso"
set cert "your-fortigate-cert"
set entity-id "http://fortigate.company/remote/saml/metadata/"
set single-sign-on-url "https://fortigate.company/remote/saml/login"
set single-logout-url "https://fortigate.company/remote/saml/logout"
set idp-entity-id "https://authentik.company"
set idp-single-sign-on-url "https://authentik.company/application/saml/fortigate-sslvpn/sso/binding/redirect/"
set idp-single-logout-url "https://authentik.company/application/saml/fortigate-sslvpn/slo/binding/redirect/"
set idp-cert "your-authentik-cert"
set user-name "http://schemas.goauthentik.io/2021/02/saml/username"
set group-name "http://schemas.xmlsoap.org/claims/Group"
set digest-method sha256
next
end
Configure the FortiGate user group:
config user group
edit "sslvpn-users"
set member "authentik-sso"
config match
edit 1
set server-name "authentik-sso"
set group-name "FortiGate SSLVPN Users"
next
end
next
end
:::info Remember to map the user group to a portal in the 'SSL-VPN Settings' page and add it to firewall rules, or users will be redirected back to authentik with a logout immediately upon each login attempt. :::
https://fortigate.companyTo verify the integration:
https://fortigate.company:::info If you encounter any issues:
diagnose debug enable
diag debug application samld -1