Microsoft Entra ID SAML Authentication with Firebox Mobile VPN with SSL Integration Guide

This integration guide describes how to set up SAML authentication through the Mobile VPN with SSL client with Microsoft Entra ID as the Identity Provider.

In Fireware v12.11 or higher, the SAML authentication server can integrate with several identity providers. After you configure the SAML authentication server on the Firebox, you can use it to integrate with the Mobile VPN with SSL client.

The Mobile VPN with SSL client for Windows supports SAML authentication with v12.11 and higher. The Mobile VPN with SSL client for macOS supports SAML authentication with v12.11.2 and higher. Third-party OpenVPN clients are not supported.

Contents

Integration Summary

The hardware and software used in this guide include:

  • Microsoft Entra ID
    • You must have a Microsoft Azure global administrator account within the Microsoft Entra ID tenant
    • You must have created a user in Microsoft Entra ID or synchronized an on-premises Active Directory user to Microsoft Entra ID
  • WatchGuard Firebox with Fireware v12.11 or higher
  • WatchGuard Mobile VPN with SSL client for Windows or macOS
  • A fully qualified domain name (FQDN) that can resolve to the external IP address of Firebox

Additional charges might apply to use Microsoft Entra ID.

Test Topology

Microsoft Entra ID communicates with various cloud-based services and service providers with the SAML protocol. This integration uses Microsoft Entra ID to communicate with a WatchGuard Firebox over a public Internet connection.

Screenshot of Topology diagram

Enable the Firebox SAML Authentication Server

The steps to set up SAML authentication for Mobile VPN with SSL are different based on how you manage your Firebox (cloud-managed or locally managed).