Archive
Re: Forticlient SSL VPN with SAML error -7200 at 4…

Re: Forticlient SSL VPN with SAML error -7200 at 4…

2024-11-25 Hi , I is setup have recently setup SAML auth with Azure ad but ca nt get it to work via Forticlient .    Users is login can login to the webportal an

Related articles

Getting Started with Xcode Cloud The cloud kitchen model explained, Hospitality News, ET HospitalityWorld What is the Best VPN for China in 2023? A Complete Guide

Hi ,

 

I is setup have recently setup SAML auth with Azure ad but ca nt get it to work via Forticlient .   

 

Users is login can login to the webportal and auth using SSO successfully , its just Forticlient that fail .

 

When users try to connect via Forticlient they are directed to the correct Microsoft Login URL and can successfully auth with their Azure creds(including MFA) but after accepting the MFA prompt Forticlient stops at 48% and shows “Credential or SSLVPN configuration is wrong (-7200)”.  

check the SSL – VPN Monitor in the Forti show the user as being connect but only with ” web connection ” instead of ” Tunnel connection “

 

It almost like when authenticating Forticlient cant find the user in a User Group so assigned it to the Web-access portal

 

Running Forticlient 7.0 and firmware 7.0.1 on the Forti

 

There is a post on Reddit about the SLL-VPN certificate key length having to be 2048 but we are using a certificate with a key length of 4096.

 

CONFIG BELOW (using example FQDN)

——————————————————–

config user saml
edit " azure - saml "
set cert "Fortinet"
set entity - id " https://example-company.com:10443/remote/saml/metadata "
set single - sign - on - url " https://example-company.com:10443/remote/saml/login "
set single-logout-url "https://example-company.com:10443/remote/saml/logout"
set idp-entity-id "https://sts.windows.net/YYY-e027-4bb6-a213-XXX/"
set idp-single-sign-on-url "https://login.microsoftonline.com/YYY-e027-4bb6-a213-XXX/saml2"
set idp-single-logout-url "https://login.microsoftonline.com/YYY-e027-4bb6-a213-XXX/saml2"
set idp-cert "Azure_SAML"
set user - name " username "
set group-name "group"
next
end

config user group
edit " SAML_AZ_ALL "
set member " azure - saml "
config match
edit 1
set server-name "azure-saml"
set group-name "YYY-a79a-40f0-a2df-XXX" (Object ID of my Azure group)
next
end
next
end