Skip to main content
Skip table of contents

FortiGate Admin Login SAML Integration

This document explains how to implement Monosign with FortiGate Firewall Admin login. It covers Single Sign-On. Before you continue, it is better to start with FortiGate's Single Sign-On this page.

To be able to use SAML as an authentication method you need to have FortiOS@6.4 or above.

đź“‘ Instructions

This documentation contains 4 main steps for integration.

  1. Creating an Application on Monosign

  2. Configuration Single Sign-On for FortiGate

  3. Assign a user to the FortiGate application

  4. Sign In Test

  5. Optional Settings on Fortigate

1- Creating an Application on Monosign

Create application on Monosign and configure your access policy. Once you create, click “Keys” and add a new Access Key for SAML Key for access.

This information will be necessary during the configuration of the FortiGate application.




Key Type


Rest API, OAuth 2.0, JWT, OIDC/OpenID, SAML, RADIUS, Access Gateway, LDAP, AuthN/Z Server



Lifetime or Specific Date/Time - By Default Lifetime is Enabled.

Configuration details for the FortiGate application are provided as follows:

Change ACS(Assertion Consumer Url), Entity Id, NameId Format, Name Id and Extra Attributes.



Assertion Consumer Url


Entity Id


NameId Format

System Default (unspecified)

Name Id


Extra Attribute

Attribute : username

Value : {{UserName}}

To ensure that the application has access to user groups, follow these steps:

  1. If the application hasn't been configured yet, click the “Edit” option for the application.

  2. In the application settings, navigate to the “Source, Provider, and Profile” tab.

  3. Configure the “User Access Type“ and “User Group Access Type” as “Only Assigned Users.”

Configuring this setting will allow the application to access by user groups when users sign in.




User Access Type

Defines which Users will access to this application.

Only Assigned Users
All Users

User Group Access Type

Defines application’s user group access

Only Assigned Users
Assigned Users and Defined Sources
All Users

Profile Access Type

Defines Application’s user’s profile access

Restricted - Only restricted user profile attributes
All - All user profile attributes

2- Configuration Single Sign-On for FortiGate

As it highlighted at the beginning of document, please check out the FortiGate’s SSO configuration page first.

Please add your SAML settings to the application. The following information is needed for your configuration.














Before continue please download Monosign IdP certificate from the application key details.

From CLI

Connect your FortiGate firewall via command line and run below commands.

config system saml
  set status enable
  set server-address "<FW_IP_FQDN:PORT>"
  set default-profile "super_admin"
  set entity-id "https://<FW_IP_FQDN:PORT>"
  set idp-entity-id ""
  set idp-single-sign-on-url ""
  set idp-single-logout-url ""
  set idp-cert "Monosign_SAML_Cert"

From Web GUI

From FortiOS 6.2 to 7, Go to Security Fabric → Settings → SAML single Sign-On

After FortiOS 7 Go to Security Fabric → Fabric Connectors and Edit Security Fabric Setup. Click Single Sign-On Settings

Now, go back to Monosign and give access to your users and try login.

3- Assign a user to the FortiGate application

Please follow below instructions on how to assign a user to the FortiGate application. In this example john.smith will assign to the application access.

4- Sign In Test

Now try login. Navigate to the FortiGate application. Click Sign in with Security Fabric.

If everything is well configured, the page will be redirected to Monosign’s login page. It can be log in passwordless with QR code or type username and password.

After that FortiGate warn assigned user has been created on the firewall.

When the user logged in, the page will be redirected to the FortiGate Admin page. It can be verified right top of the page new user is logged-in with SSO.

5- Optional Settings on FortiGate

By default FortiGate is using local and SSO login in the same login page. It can be disable local login please follow below steps.


Set Default-Login Page to SSO

config system saml
  set default-login-page sso

Revert back to login page from SSO to Normal

config system saml
  set default-login-page normal

Web UI

Set Default-Login Page to SSO

Revert back to login page from SSO to Normal

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.