<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Duo LDAPS migration to SAML with DAPS in VPN</title>
    <link>https://community.cisco.com/t5/vpn/cisco-duo-ldaps-migration-to-saml-with-daps/m-p/4824982#M288945</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/235624"&gt;@LindseyJGreen&lt;/a&gt;&amp;nbsp;If my understanding is correct , what you are saying here is when deploying SAML as an authentication for SSL VPN it does not use DAP ( Dynamic Access Policy ) . It is not true as&amp;nbsp;DAP applies to all remote access and clientless sessions and cannot be disabled – it is always running from the moment the ASA is powered on .&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 30 Apr 2023 20:47:15 GMT</pubDate>
    <dc:creator>Salman Mahajan</dc:creator>
    <dc:date>2023-04-30T20:47:15Z</dc:date>
    <item>
      <title>Cisco Duo LDAPS migration to SAML with DAPS</title>
      <link>https://community.cisco.com/t5/vpn/cisco-duo-ldaps-migration-to-saml-with-daps/m-p/4824115#M288907</link>
      <description>&lt;P&gt;We currently use Cisco Duo with LDAPS for our SSL VPN Clients. On the firewall (ASA5508) we have Dynamic Access Policies in place, allowing certain Active Directory groups access to certain subnets.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When testing moving to SAML (Hybrid AzureAD with on prem domain controllers) for MFA, this no longer uses DAP.&lt;/P&gt;
&lt;P&gt;How can we secure our different networks on a per user basis instead?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 11:57:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-duo-ldaps-migration-to-saml-with-daps/m-p/4824115#M288907</guid>
      <dc:creator>LindseyJGreen</dc:creator>
      <dc:date>2023-04-28T11:57:45Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Duo LDAPS migration to SAML with DAPS</title>
      <link>https://community.cisco.com/t5/vpn/cisco-duo-ldaps-migration-to-saml-with-daps/m-p/4824982#M288945</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/235624"&gt;@LindseyJGreen&lt;/a&gt;&amp;nbsp;If my understanding is correct , what you are saying here is when deploying SAML as an authentication for SSL VPN it does not use DAP ( Dynamic Access Policy ) . It is not true as&amp;nbsp;DAP applies to all remote access and clientless sessions and cannot be disabled – it is always running from the moment the ASA is powered on .&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Apr 2023 20:47:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-duo-ldaps-migration-to-saml-with-daps/m-p/4824982#M288945</guid>
      <dc:creator>Salman Mahajan</dc:creator>
      <dc:date>2023-04-30T20:47:15Z</dc:date>
    </item>
  </channel>
</rss>

