Configuring external IdP
After you have successfully enrolled for external IdP for your FortiCloud account, you can begin to configure the external IdP with the URLs provided by Fortinet Inc..
This document only covers configuring external IdP with Okta and Microsoft Entra ID. However, multiple external identity providers are supported by FortiCloud. This topic includes the following configuration examples:
Configuring with Okta
External IdP can be configured with Okta.
To configure external IdP with Okta:
-
In Okta, go to Applications > Applications.
-
Navigate to the application you created when enrolling.
-
Edit the General > SAML Settings:
-
Replace the temporary URLs with the information provided by Fortinet Inc. team:
Entra ID field
Fortinet Inc. external IdP information
Single sign-on URL SP Login (Assertion Consumer Service ACS) URL Audience URI (SP Entity ID) SP Entity ID Default RelayState Portal URL (Relay State) -
Click Save.
-
Configuring with Entra ID
External IdP can be configured with Okta.
To configure external IdP with Entra ID:
-
In Microsoft Azure, select Microsoft Entra ID.
-
Go to Enterprise applications.
-
Navigate to the application you created when enrolling.
-
Select Set up single sign on.
-
Edit the Basic SAML Configuration:
-
Replace the temporary URLs with the information provided by Fortinet Inc. team:
Entra ID field
Fortinet Inc. external IdP information
Identifier (Entity ID) SP Entity ID Reply URL (Assertion Consumer Service URL) SP Login (Assertion Consumer Service ACS) URL Relay State Portal URL (Relay State) Logout Url
SP Logout (SLS)
-
Click Save.
-