- On FortiGate, go to Security Fabric > Fabric Connectors.
Create a new FSSO agent connector to the FortiAuthenticator.
- Select Apply & Refresh. The SAML user groups name has been successfully pushed to FortiGate from FortiAuthenticator, appearing when you select View.
Select View and make sure that the FSSO group has been pushed to FortiGate.
- Go to User & Device > User Groups and create a new user group.
Enter a name, set Type to Fortinet Single Sign-On (FSSO), and add the FSSO group as a Member.
In order to automatically redirect the user to the initial website after authentication, erase the existing HTML code and replace it with the following HTML code on the FortiGate in System > Replacement Messages > Authentication > Login Page.
<FortiAuthenticator-FQDN> with the DNS name of the FortiAuthenticator.
- Go to Policy & Objects > Addresses and add the FortiAuthenticator as an address object.
- Create the FQDN objects below.
As these are FQDNs, make sure to set Type to FQDN.
- Create an Address group and name it Okta Bypass and add the FQDNs you created above into the Okta Bypass address group.
- Go to Policy & Objects > IPv4 Policy and create all policies shown in the examples below: a policy for DNS, for access to the FortiAuthenticator, for Okta bypass, and for FSSO including the SAML user group.
Allow access to the FortiAuthenticator on the DMZ from the LAN:
Add the following three policies in order:
In the SSO_Internet_Access policy, add the Firewall Guest-group and the Okta FSSO group that is received from FortiAuthenticator. The Guest-group redirects the initial Internet access request from the browser to Okta. Once the user is authenticated the browser will automatically redirect to the website from the initial HTTP/HTTPS request matching the Okta SSO group.