Microsoft Entra ID SAML Authentication with Firebox Mobile VPN with SSL Integration Guide

This integration guide describes how to set up SAML authentication through the Mobile VPN with SSL client with Microsoft Entra ID as the Identity Provider.

In Fireware v12.11 or higher, the SAML authentication server can integrate with several identity providers. After you configure the SAML authentication server on the Firebox, you can use it to integrate with the Mobile VPN with SSL client.

We do not currently support the Microsoft Entra ID passwordless authentication options.

The Mobile VPN with SSL client for Windows supports SAML authentication with v12.11 and higher. The Mobile VPN with SSL client for macOS supports SAML authentication with v12.11.2 and higher. Third-party OpenVPN clients are not supported.

Contents

Integration Summary

The hardware and software used in this guide include:

  • Microsoft Entra ID
    • You must have a Microsoft Azure global administrator account within the Microsoft Entra ID tenant.
    • You must have created a user in Microsoft Entra ID or synchronized an on-premises Active Directory user to Microsoft Entra ID.
  • WatchGuard Firebox with Fireware v12.11 or higher
  • WatchGuard Mobile VPN with SSL client for Windows or macOS
  • A fully qualified domain name (FQDN) that can resolve to the external IP address of Firebox

Additional charges might apply to use Microsoft Entra ID.

Test Topology

Microsoft Entra ID communicates with various cloud-based services and service providers with the SAML protocol. This integration uses Microsoft Entra ID to communicate with a WatchGuard Firebox over a public Internet connection.

Screenshot of Topology diagram

To set up SAML authentication through the Mobile VPN with SSL client with Microsoft Entra ID, complete these steps:

  1. Enable the Firebox SAML Authentication Server
  2. Configure Firebox Mobile VPN with SSL
  3. Configure Microsoft Entra ID
  4. Complete SAML Authentication Server Setup
  5. Complete Firebox Mobile VPN with SSL Setup

Enable the Firebox SAML Authentication Server

To enable the Firebox SAML authentication server, from Fireware Web UI:

  1. Log in to Fireware Web UI at: https://<your Firebox IP address>:8080
  2. From the navigation menu, select Authentication > Servers.
  3. Select SAML.
    The SAML settings page opens.
  4. Screenshot of Firebox, Firebox Auth Server setup 1

  5. Select the Enable SAML check box.
  6. In the IdP Name text box, type a name for the identity provider. In our example, we type Entra_ID_SAML.
  7. In the Host Name text box, type an FQDN that resolves to the Firebox external interface.
  8. Keep the IdP Metadata URL text box blank. We add the IdP settings later.
  9. Click Save.

The Firebox cannot support multiple IdP applications at the same time. Each IdP application has a unique IdP Metadata URL.

Configure Firebox Mobile VPN with SSL

To configure Mobile VPN with SSL on the Firebox, from Fireware Web UI:

  1. Log in to Fireware Web UI at: https://<your Firebox IP address>:8080
  2. From the navigation menu, select VPN > Mobile VPN.
  3. In the SSL section, click Manually Configure.
    The Mobile VPN with SSL configuration settings open.
  4. Screenshot of Firebox, Firebox Access Portal config 1

  5. Select the Activate Mobile VPN with SSL check box.
  6. In the Primary text box, type the FQDN that resolves to the Firebox external interface. This is the domain name that Mobile VPN with SSL clients connect to by default and must be the same as the Host Name you configure in the Enable the Firebox SAML Authentication Server section. In this example, we type ecotest.com.
  7. Select the Authentication tab.
    The Authentication settings open.
  8. Screenshot of Firebox, Firebox Access Portal config 2

  9. In the Authentication Server Settings section, from the Authentication Servers drop-down list, select the SAML authentication server you created in the Enable the Firebox SAML Authentication Server section. In our example, we select Entra_ID_SAML.
  10. Click Add.
    The server appears in the Authentication Server list.
  11. Click Save.
  12. Copy the SP Metadata URL, then click Done.
    The Update IdP configuration page opens.
  13. Screenshot of Firebox, Firebox Access Portal config 3

  14. Open a web browser and go to the SP Metadata URL you copied in the step above:
    https://[Host name or Firebox IP address]/auth/saml
    The SAML 2.0 Configuration page opens.
  15. Screenshot of Firebox, Firebox SAML SP info

  16. From the Option 2 section, copy the details. You use this information when you configure Entra ID:
    • SAML Entity ID in this format:
      https://<host name>/auth/saml
    • Assertion Consumer Service (ACS) URL in this format:
      https://<host name>/auth/saml/acs
    • Single Logout Service (SLS) URL in this format:
      https://<host name>/auth/saml/sls
    • X.509 Certificate: Download or copy and save the certificate.

Configure Microsoft Entra ID

To configure Microsoft Entra ID, complete these steps:

  1. Create a Microsoft Entra ID group and user
  2. Configure a SAML application

Create a Microsoft Entra ID Group and User

If you already created users and groups in Microsoft Entra ID or synced on-premises users and groups to Microsoft Entra ID, you can skip the steps to create the group and user in Microsoft Entra ID and go to the Configure a SAML Application section.

To create a group in Microsoft Entra ID:

  1. Log in to the Azure portal with your Microsoft Azure account credentials.
  2. Click Microsoft Entra ID.
  3. From the navigation menu, select Manage > Groups.
  4. Click New Group.
    The New Group page opens.
  5. Screenshot of Entra ID, Azure new group setup 1

  6. From the Group Type drop-down list, select Security.
  7. In the Group Name text box, type a descriptive group name. For our example, we type sslvpn_group.
  8. From the Membership Type drop-down list, select Assigned.
  9. Keep the default values for all other settings.
  10. Click Create.

To create a user in Microsoft Entra ID:

  1. Log in to the Azure portal with your Microsoft Azure account credentials.
  2. Click Microsoft Entra ID.
  3. From the navigation menu, select Manage > Users.
  4. Select New User > Create New User.
    The Create New User page opens.
  5. Screenshot of Entra ID, Azure new user setup 1

  6. From the Basics tab, enter the user information.
  7. From the Assignments tab, to assign the user to the group you created, click Add Group.
  8. Screenshot of Entra ID, Azure new user setup 2

  9. Click Review + Create.
  10. Click Create.

Configure a SAML Application

To configure a SAML application in Microsoft Entra ID:

  1. Log in to the Azure portal with your Microsoft Azure account credentials.
  2. Click Microsoft Entra ID.
  3. From the navigation menu, select Manage > Enterprise applications.
  4. Click New Application.
  5. Click Create Your Own Application.
    The Create Your Own Application page opens.
  6. Screenshot of Entra ID, Azure SAML app setup 1

  7. In the What's the name of your app? text box, type a descriptive name. For our example, we type Firebox SSLVPN SAML.
  8. For What are you looking to do with your application?, select Integrate any other application you don't find in the gallery (Non-gallery).
  9. Click Create.
  10. From the navigation menu, select Manage > User and Groups.
  11. Click Add User/Group.
  12. From Users and Groups, click None Selected.
    The options to select users and groups open.
  13. Screenshot of Entra ID, Azure SAML app setup 2

  14. To assign users and groups to this application, search and select the group you created in the Create a Microsoft Entra ID Group and User section. In our example, we select sslvpn_group.
  15. Click Select.
  16. Click Assign.
    The group gets assigned to your application.
  17. Screenshot of Entra ID, Azure SAML app setup 3

  18. From the navigation menu, select Single Sign-On.
  19. For Select a Single Sign-On Method, select SAML.
    The Set Up Single Sign-On with SAML page opens.
  20. Screenshot of Entra ID, Azure SAML app setup 4

  21. For the Basic SAML Configuration, click Edit.
    The Basic SAML Configuration page opens.
  22. Screenshot of Entra ID, Azure SAML app setup 5

  23. Specify the values of these parameters that you copied in the Configure Firebox Mobile VPN with SSL section:
    • Identifier (Entity ID) — Enter the SAML Entity ID in the format https://<your Firebox host name>/auth/saml.
    • Reply URL (Assertion Consumer Service URl) — Enter the Assertion Consumer Service (ACS) URL in the format https://<your Firebox host name>/auth/saml/acs.
    • Logout URL (Optional) — Enter the Single Logout Service (SLS) URL in the format https://<your Firebox host name>/auth/saml/sls.
  24. To close the Basic SAML Configuration page, click Save, then click .
  25. In the Test Single Sign-On dialog box, click No, I'll Test Later.
  26. In the Attributes & Claims section, click Edit.
    The Attributes and Claims page opens.
  27. Screenshot of Entra ID, Azure SAML app setup 6

  28. To configure the group authentication for Mobile VPN with SSL, click Add a Group Claim.
    The Group Claims page opens.
  29. Screenshot of Entra ID, Azure SAML app setup 7

  30. For Which groups associated with the user should be returned in the claim?, select Groups Assigned to the Application.
  31. From the Source Attribute drop-down list, select one of these options:
    • If only Entra ID cloud security groups are assigned to the SAML application, select Cloud-Only Group Display Names.
    • If only on-premises AD security groups are assigned to the SAML application, select sAMAccountName and leave Emit Group Name for Cloud-Only Groups blank.
    • If both on-premises Active Directory security groups and the Entra ID cloud security group are assigned to the SAML application, select sAMAccountName and select the Emit Group Name For Cloud-Only Groups check box. Select this option if you use AD connect or your on-premises AD is connected to your Microsoft Entra ID account.
  32. Expand the Advanced Options section, then select Customize the Name of the Group Claim.
  33. In the Name (required) text box, type memberOf.
  34. To close the Attributes & Claims page, click Save, then click .
  35. From the SAML Certificates section, copy the App Federation Metadata Url. You need this URL to complete the SAML authentication server configuration on the Firebox.
  36. From the left navigation, select Security > Token Encryption.
    The Token Encryption page opens.
  37. Screenshot of Entra ID, Azure SAML app setup 8

  38. To upload the X.509 Certificate you downloaded in the Configure Firebox Mobile VPN with SSL section, click Import Certificate.
  39. Click for the certificate, then click Activate Token Encryption Certificate.
  40. From the Activate Token Encryption Certificate dialog box, click Yes.

Complete SAML Authentication Server Setup

To complete the SAML authentication server setup, from Fireware Web UI:

  1. Log in to Fireware Web UI at: https://<your Firebox IP address>:8080
  2. From the navigation menu, select Authentication > Servers.
  3. Select SAML.
    The SAML settings open.
  4. Screenshot of Entra ID, Firebox Auth Server setup 3

  5. In the IdP Metadata URL text box, paste the value of the App Federation Metadata Url parameter you copied from the Configure a SAML Application.
  6. Click Save.

Complete Firebox Mobile VPN with SSL Setup

To complete the Mobile VPN with SSL setup, from Fireware Web UI:

  1. Log in to Fireware Web UI at: https://<your Firebox IP address>:8080
  2. From the navigation menu, select Authentication > Users and Groups.
  3. Click Add.
    The Add User or Group page opens.
  4. You can add a user for user authentication or a group for group authentication. In our example, we add a group for group authentication. If you want to add a user, the user name must be same as you created in the Create a Microsoft Entra ID Group and User section.

    Screenshot of Firebox, Firebox Access Portal config 6

  5. For Type, select Group.
  6. In the Name text box, type a name for the group. You must type the same group name you created in the Create a Microsoft Entra ID Group and User section.
  7. From the Authentication Server drop-down list, select the authentication server where the user or group exists.
  8. Click OK.
  9. Click Save.
  10. From the navigation menu, select VPN > Mobile VPN.
  11. From the SSL section, click Configure.
  12. Select the Authentication tab.
    The Authentication Server Settings open.
  13. Screenshot of Firebox, Firebox Access Portal config 7

  14. From the Users and Groups section, select the groups or users you created. In this example, we select the sslvpn_group group.
  15. Click Save.

Test the Integration

To test the integration of Entra ID SAML authentication with the Mobile VPN with SSL client:

  1. Open the Mobile VPN with SSL client.
  2. In the Server text box, type the FQDN that resolves to the Firebox external interface.
  3. Select the Use SAML Authentication check box.
  4. Screenshot of Access Portal, Integration test 1

  5. Click Connect.
  6. On the Microsoft Sign in page, type the Microsoft Entra ID user name, then click Next.
  7. Screenshot of Access Portal, Integration test 2

  8. Type the Microsoft Entra ID password for the user, then click Sign In.
  9. Screenshot of Access Portal, Integration test 3

  10. To stay signed in, click Yes.
  11. Screenshot of Access Portal, Integration test 4

    After a successful authentication, you connect to the VPN.

    Screenshot of Access Portal, Integration test 5