SAML (Security Assertion Markup Language) Authentication is a standardized protocol that enables secure Single Sign-On (SSO) between an identity provider (IdP) and a service provider (SP). Instead of managing separate credentials, users authenticate once with the IdP, which issues a digitally signed assertion containing the user’s identity and access rights. The SP consumes this assertion to grant access without directly handling passwords, improving security, centralizing authentication, and simplifying user access across multiple applications.
Steps to enable SAML Authentication for SSLVPN are described in How to configure SAML SSO on firewall for SSLVPN login using Azure AD as IdP?
while steps to enable SAML for Firewall Management are descibed here How to configure SAML for SonicWALL firewall administration using OKTA as IdP?
Once authenticated with SAML, NetExtender is connected and able to reach the Firewall Management IP
The username field is already provided and can't be changed, as excepted.
The User is reported as member of "SonicWall Administrators" group
However the firewall can't be accessed for the following reasons:
a) by clicking on
disconnect the NetExtender, session will be reconnected. This is happening because a new SAML authentication process is initiated, since the SAML SSLVpn Profile has been used.
b) If the SAML password for the SSLVPN user is entered and
is clicked, the error is reported
because there is no local user matching the SSLVPN User.
When an SSLVPN client connects using SAML authentication, the user is successfully validated by the Identity Provider (IdP) and gains network access. The appliance’s internal management IP becomes reachable, confirming the tunnel is established. However, access to the appliance’s management interface still requires a corresponding local user account that matches the authenticated SAML identity. Without this local user mapping, the SAML-authenticated session cannot be used to log in to the appliance itself, even though network connectivity is in place.
So, the workaround is to create a Local User matching the SAML username member of SonicWall Administrators group.
A local user with admin privilege is also needed for re-auth to login to the Firewall Management