FortiAuthenticator SAML 2.0 SSO Integration
This guide explains how to integrate FortiAuthenticator as a SAML 2.0 Identity Provider (IdP) for AIR.
Prerequisites
Access to FortiAuthenticator with admin privileges.
Access to AIR as an administrator.
Users to be authenticated must have their email field populated.
Ensure network connectivity between AIR and FortiAuthenticator.
Step 1: Prepare FortiAuthenticator
Log in to FortiAuthenticator with an admin account.
Go to Authentication → User Management → User Groups.

Create user groups that will act as AIR role mappings:
Use the prefix
AIR_role.
followed by the role tag used in AIR. Example:AIR_role.global_admin
Only roles that will be actively used for login need to be created.
Assign users to their corresponding AIR role groups.
Step 2: Configure FortiAuthenticator as SAML IdP
Navigate to Authentication → SAML IdP → General.\
FortiAuthenticator SAML 2.0 SSO Integration: SAML General Enable “Enable SAML Identity Provider portal.”
In the Server Address field, enter the address that AIR will use to reach FortiAuthenticator.
(Optional) Select a default IdP certificate for compatibility.
Click Save to store the settings.
Step 3: Create a Service Provider in FortiAuthenticator
Go to Authentication → SAML IdP → Service Providers.
Click Create New to register AIR.
Fill in the following:
SP Name: e.g.
AIR-Instance-X.
IdP Prefix: Auto-generate or enter manually.
Server Certificate: Select or use default.
Click Save to create the SP.\
FortiAuthenticator SAML 2.0 SSO Integration: Create new SAML Service Provider
Step 4: Configure SSO in AIR
In a new tab, log in to AIR with an admin user.
Go to Settings → Security, scroll to the SSO section.
Enable FortiAuthenticator and copy the ACS URL.

Step 5: Complete SP Configuration in FortiAuthenticator
Return to the SP config in FortiAuthenticator.
Under SP Metadata, fill in:
SP Entity ID → Paste ACS URL.
SP ACS (Login) URL → Paste ACS URL again.\
Under Assertion Attributes, configure:
Subject Name ID →
email.
Format →
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress.
Add the following assertions:
SAML AttributeUser AttributeRequiredgroups
FAC local group
✅
firstName
First name
❌
lastName
Last name
❌

Click Save
Step 6: Export IdP Metadata
Open the newly created SP entry.
Click Download IdP Metadata.\
FortiAuthenticator SAML 2.0 SSO Integration: Download Metadata
Step 7: Upload Metadata to AIR
Go back to AIR → Settings → Security → SSO
Click Upload IdP Metadata.

Alternatively, enter the values manually
Click Save.
Step 8: Test the Integration
Log out of AIR.
Click Login with FortiAuthenticator.
After authenticating via Forti, you’ll be redirected to AIR.
Troubleshooting
If login fails, check:
Network access between AIR and FortiAuthenticator.
Group mapping (user must belong to an
AIR_role.X
group).\FortiAuthenticator SAML 2.0 SSO Integration: Role Tags User has a valid email address
Review SAML logs from both ends if needed
Example Role Mappings
Global Admin
global_admin
AIR_role.global_admin
Organization Admin
organization_admin
AIR_role.organization_admin
L1 & L2 Analyst
l1_l2_analyst
AIR_role.l1_l2_analyst
Maintenance Engineer
maintenance_engineer
AIR_role.maintenance_engineer
L3 & L4 Analyst
l3_l4_analyst
AIR_role.l3_l4_analyst
Responder
responder
AIR_role.responder
Last updated
Was this helpful?