Fortinet black logo

Administration Guide

Setting up Service Provider for FortiEDR

Copy Link
Copy Doc ID 82fbe02c-e479-11eb-97f7-00505692583a:570458
Download PDF
Setting up Service Provider for FortiEDR
To configure FortiEDR as a SAML service provider on FortiAuthenticator:
  1. Go to Authentication > SAML IdP > Service Providers.
  2. Select Create New.

  3. Fill in the following fields:
    • SP name: Enter a name for the FortiEDR SP.
    • IDP prefix: Select Generate prefix in order to generate a random 16-digit alphanumeric string or alternatively enter a prefix for the IDP that is appended to the end of the IDP URLs.
  4. Click Download IDP metadata to save the FortiAuthenticator IDP data file to be used for uploading into FortiEDR. Refer to step 3 in SAML Authentication for more information.
  5. Click Import SP metadata and select the SP data file that was downloaded from FortiEDR. Refer to step 2 in SAML Authentication for more information.

  6. All other service provider configuration fields are auto-filled after the SP data file import:

  7. Click OK to apply the changes.
  8. Go to Authentication > SAML IdP > Service Providers and double-click to open the Service Provider that you created in the previous step.
  9. 9 In the SAML Attribute section, click Create New.

  10. In the popup window, enter the attribute name that was configured in the FortiEDR SAML Authentication settings and select FortiAuthenticator Group as the User Attribute.

    In our example, we use fortiedr_role as an attribute name, as shown below:

    And therefore the configuration on FortiAuthenticator appears as follows:

  11. Click OK to save the changes.

FortiAuthenticator can now be used as the IdP, which provides authorization and authentication for users trying to access the FortiEDR Central Manager Console. When logging into the FortiEDR Console via the SSO url that is specified in the SAML settings page, a FortiAuthenticator user is awarded access permissions to the FortiEDR Central Manager according to the User Groups into which he/she was added.

Setting up Service Provider for FortiEDR
To configure FortiEDR as a SAML service provider on FortiAuthenticator:
  1. Go to Authentication > SAML IdP > Service Providers.
  2. Select Create New.

  3. Fill in the following fields:
    • SP name: Enter a name for the FortiEDR SP.
    • IDP prefix: Select Generate prefix in order to generate a random 16-digit alphanumeric string or alternatively enter a prefix for the IDP that is appended to the end of the IDP URLs.
  4. Click Download IDP metadata to save the FortiAuthenticator IDP data file to be used for uploading into FortiEDR. Refer to step 3 in SAML Authentication for more information.
  5. Click Import SP metadata and select the SP data file that was downloaded from FortiEDR. Refer to step 2 in SAML Authentication for more information.

  6. All other service provider configuration fields are auto-filled after the SP data file import:

  7. Click OK to apply the changes.
  8. Go to Authentication > SAML IdP > Service Providers and double-click to open the Service Provider that you created in the previous step.
  9. 9 In the SAML Attribute section, click Create New.

  10. In the popup window, enter the attribute name that was configured in the FortiEDR SAML Authentication settings and select FortiAuthenticator Group as the User Attribute.

    In our example, we use fortiedr_role as an attribute name, as shown below:

    And therefore the configuration on FortiAuthenticator appears as follows:

  11. Click OK to save the changes.

FortiAuthenticator can now be used as the IdP, which provides authorization and authentication for users trying to access the FortiEDR Central Manager Console. When logging into the FortiEDR Console via the SSO url that is specified in the SAML settings page, a FortiAuthenticator user is awarded access permissions to the FortiEDR Central Manager according to the User Groups into which he/she was added.