SAML certificate verification
For security purposes, in previous versions, FortiGate required a signature verification for both the SAML response message and the SAML assertion carried inside the SAML response. This means that the SAML response must have a valid signature, and the SAML assertion must also have a valid signature. If the Identity Provider (IdP) provides an invalid signature, or fails to sign one of these, the FortiGate will reject the SAML response.
This has now been loosened with the following configuration:
config user saml
edit <name>
set require-signed-resp-and-asrt <enable | disable>
next
end
|
Option |
Description |
|---|---|
|
enable |
Both response and assertion must be signed and valid. |
|
disable |
At least one of response or assertion must be signed and valid (default). |
By default, the setting is disabled, which only requires one of the response or assertion to be signed and valid.
For more information, see Identify Providers.