<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Anyconnect authentication using ADFS SAML in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4312310#M1079506</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for a customer i'm trying to authenticate anyconnect using an AD, but i can't get it work. On the Cisco ASA is see the following messages:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mar 23 15:02:07 [SAML] consume_assertion: The identifier of a provider is unknown to #LassoServer. To register a provider in a #LassoServer object, you must use the methods lasso_server_add_provider() or lasso_server_add_provider_from_buffer().&lt;BR /&gt;Mar 23 15:02:07&lt;BR /&gt;[SAML] consume_assertion:&lt;BR /&gt;&lt;BR /&gt;[saml] webvpn_login_primary_username: SAML assertion validation failed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What do does messages mean? Could it be that the wrong saml idp url is being used or is it something else?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the ASA we are running&amp;nbsp;9.8(4)29&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 23 Mar 2021 14:20:42 GMT</pubDate>
    <dc:creator>Pascal Lacroix</dc:creator>
    <dc:date>2021-03-23T14:20:42Z</dc:date>
    <item>
      <title>Anyconnect authentication using ADFS SAML</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4312310#M1079506</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for a customer i'm trying to authenticate anyconnect using an AD, but i can't get it work. On the Cisco ASA is see the following messages:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mar 23 15:02:07 [SAML] consume_assertion: The identifier of a provider is unknown to #LassoServer. To register a provider in a #LassoServer object, you must use the methods lasso_server_add_provider() or lasso_server_add_provider_from_buffer().&lt;BR /&gt;Mar 23 15:02:07&lt;BR /&gt;[SAML] consume_assertion:&lt;BR /&gt;&lt;BR /&gt;[saml] webvpn_login_primary_username: SAML assertion validation failed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What do does messages mean? Could it be that the wrong saml idp url is being used or is it something else?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the ASA we are running&amp;nbsp;9.8(4)29&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Mar 2021 14:20:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4312310#M1079506</guid>
      <dc:creator>Pascal Lacroix</dc:creator>
      <dc:date>2021-03-23T14:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication using ADFS SAML</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4312449#M1079510</link>
      <description>&lt;P&gt;If you made any changes to the SAML section after associating it with your tunnel-group (connection profile in ASDM), you have to remove and re-apply it. The #LassoServer errors are often a result of that issue.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Mar 2021 17:21:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4312449#M1079510</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-03-23T17:21:50Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication using ADFS SAML</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4312858#M1079539</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;i already did that by removing and adding the saml identity-provider url in the tunnel-group webvpn-attributes, but that didn't resolve the issue&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tunnel-group AD-SAML webvpn-attributes&lt;BR /&gt;no saml identity-provider &amp;lt;url&amp;gt;&lt;/P&gt;&lt;P&gt;saml identity-provider &amp;lt;url&amp;gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Mar 2021 07:28:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4312858#M1079539</guid>
      <dc:creator>Pascal Lacroix</dc:creator>
      <dc:date>2021-03-24T07:28:16Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication using ADFS SAML</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4313729#M1079588</link>
      <description>&lt;P&gt;Is this setup authenticating via an Azure AD instance?&lt;/P&gt;</description>
      <pubDate>Thu, 25 Mar 2021 11:00:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4313729#M1079588</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-03-25T11:00:47Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication using ADFS SAML</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4314284#M1079631</link>
      <description>&lt;P&gt;we are using a local AD for authentication. In the future it will be an Azure AD&lt;/P&gt;</description>
      <pubDate>Fri, 26 Mar 2021 07:25:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4314284#M1079631</guid>
      <dc:creator>Pascal Lacroix</dc:creator>
      <dc:date>2021-03-26T07:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication using ADFS SAML</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4314304#M1079633</link>
      <description>&lt;P&gt;Given that, I would suspect the wrong SAML iDP URL is being used.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Mar 2021 08:26:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4314304#M1079633</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-03-26T08:26:05Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication using ADFS SAML</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4315486#M1079744</link>
      <description>&lt;P&gt;Customer is using a Microsoft ADFS with the following url:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;saml idp &lt;A href="https://xx.yy.zz/adfs/services/trust" target="_blank"&gt;https://xx.yy.zz/adfs/services/trust&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Mar 2021 14:41:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4315486#M1079744</guid>
      <dc:creator>Pascal Lacroix</dc:creator>
      <dc:date>2021-03-29T14:41:57Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication using ADFS SAML</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4316157#M1079778</link>
      <description>&lt;P&gt;I've never set it up with on-premise but in Azure it works fine.&lt;/P&gt;
&lt;P&gt;I did find this guide for integrating a different app (Atlassian) with on-premise AD FS SAML. You should be able to follow most of the steps in it to work with your ASA:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.atlassian.com/security-and-access-policies/docs/configure-saml-single-sign-on-with-ad-fs/" target="_blank"&gt;https://support.atlassian.com/security-and-access-policies/docs/configure-saml-single-sign-on-with-ad-fs/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Mar 2021 13:20:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4316157#M1079778</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-03-30T13:20:49Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication using ADFS SAML</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4581648#M1088749</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i am having issue with integrating Azure MFA with ASA anyconnect.&amp;nbsp;&lt;/P&gt;&lt;H1&gt;&lt;SPAN&gt;This&amp;nbsp;vpn1.company.com&amp;nbsp;page can’t be found&lt;/SPAN&gt;&lt;/H1&gt;&lt;P&gt;No webpage was found for the web address:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;A href="https://vpn1.samvadya.com/+CSCOE+/SAML/SP/ACS?tgname=Azure-MFA" target="_blank" rel="noopener"&gt;https://vpn1.company.com/+CSCOE+/SAML/SP/ACS?tgname=Azure-MFA&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV class=""&gt;HTTP ERROR 404&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;got below from Debugs:&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;P&gt;Mar 30 17:29:24 [SAML] get_lasso_signature_method:&lt;BR /&gt;Use SHA256 in SAML Request&lt;BR /&gt;Mar 30 17:29:24 [SAML] saml_add_config: SAML config added to list&lt;/P&gt;&lt;P&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;Public archive directives retrieved from cache for index 1.&lt;BR /&gt;Mar 30 17:29:37&lt;BR /&gt;[SAML] build_authnrequest:&lt;BR /&gt;&lt;A href="https://login.microsoftonline.com/23e274fb-1240-4362-9b03-6b133e33c70e/saml2?SAMLRequest=fVLLTsMwEPyVyPfEsd0m1GorhT6kSoAQIA5ckJtuqCXHDl6nPL4eJwipHOA6O7M7M%2FYcVWs6WfXhaO%2FgtQcMyXtrLMpxsCC9t9Ip1CitagFlqOV9dX0leZbLzrvgamfImeR%2FhUIEH7SzJNmtF%2BSZbTe5KASfCFZNL2d8U1SbsixYVTI%2BvShXJHkEj5G%2FIFEeRYg97CwGZUOEcs7TXKQif2BMTmdSlE8kWccM2qowqo4hdCgpNe5F26zVtXfomuCs0Ray2rWUC%2BDlpNmnjE%2FydCIKns72cWmxZ0KAEHWZAx2ScZJsna9h7GpBGmUQBke3MZQ%2BwQ%2BynA9kOTr1y5%2F7p86yLA5O6vChxrsDi2JHWwjqoIKi1WfvIb3eVnN6vmH%2B%2FUI3scvd%2BtYZXX8MPloV%2Fq6aZWxE9CFtRqrsLXZQ60bDgSSVMe5t5UGF6Dr4Hghdfh%2F9%2FROWXw%3D%3D&amp;amp;SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&amp;amp;Signature=k6uKzSQdDs6zsnNGuvxqmxiAngha16ioBeL7k%2Fm3fwKWr8ITjGT6U9RC9oFkvhhawIRQ0GGnOYgEAQM8GFYKqrhFCYPGDKi2zYhSKq0HrL1C2l1SF5u55eTu2ZmagjJp4ELD2KW0v8nRITECOBgJPMFqn%2FDsRbomASFu1UKnXKsewqcQXaMix%2BNuydekXOJ6YqWRpXVaSTc4g02NcyV2rje8zaTkFoxRSxBEOLLrKtoRmRpgKRc7uRKEiexxuSeQHgCa7jcnOHKo4WYx2wuu9pjyy4qVAyzFPzddz1UlYOXHvXeF7xRHxWPRu8w7vwx1S5jBy2Vc0eTOEh%2BrUG%2BG0Q%3D%3D" target="_blank" rel="noopener"&gt;https://login.microsoftonline.com/23e274fb-1240-4362-9b03-6b133e33c70e/saml2?SAMLRequest=fVLLTsMwEPyVyPfEsd0m1GorhT6kSoAQIA5ckJtuqCXHDl6nPL4eJwipHOA6O7M7M%2FYcVWs6WfXhaO%2FgtQcMyXtrLMpxsCC9t9Ip1CitagFlqOV9dX0leZbLzrvgamfImeR%2FhUIEH7SzJNmtF%2BSZbTe5KASfCFZNL2d8U1SbsixYVTI%2BvShXJHkEj5G%2FIFEeRYg97CwGZUOEcs7TXKQif2BMTmdSlE8kWccM2qowqo4hdCgpNe5F26zVtXfomuCs0Ray2rWUC%2BDlpNmnjE%2FydCIKns72cWmxZ0KAEHWZAx2ScZJsna9h7GpBGmUQBke3MZQ%2BwQ%2BynA9kOTr1y5%2F7p86yLA5O6vChxrsDi2JHWwjqoIKi1WfvIb3eVnN6vmH%2B%2FUI3scvd%2BtYZXX8MPloV%2Fq6aZWxE9CFtRqrsLXZQ60bDgSSVMe5t5UGF6Dr4Hghdfh%2F9%2FROWXw%3D%3D&amp;amp;SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&amp;amp;Signature=k6uKzSQdDs6zsnNGuvxqmxiAngha16ioBeL7k%2Fm3fwKWr8ITjGT6U9RC9oFkvhhawIRQ0GGnOYgEAQM8GFYKqrhFCYPGDKi2zYhSKq0HrL1C2l1SF5u55eTu2ZmagjJp4ELD2KW0v8nRITECOBgJPMFqn%2FDsRbomASFu1UKnXKsewqcQXaMix%2BNuydekXOJ6YqWRpXVaSTc4g02NcyV2rje8zaTkFoxRSxBEOLLrKtoRmRpgKRc7uRKEiexxuSeQHgCa7jcnOHKo4WYx2wuu9pjyy4qVAyzFPzddz1UlYOXHvXeF7xRHxWPRu8w7vwx1S5jBy2Vc0eTOEh%2BrUG%2BG0Q%3D%3D&lt;/A&gt;&lt;BR /&gt;[SAML] saml_is_idp_internal: getting SAML config for tg Azure-MFA&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ANy idea what i am missing?&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 30 Mar 2022 06:54:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4581648#M1088749</guid>
      <dc:creator>SPoodari</dc:creator>
      <dc:date>2022-03-30T06:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication using ADFS SAML</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4581707#M1088753</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1230563"&gt;@SPoodari&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's hard to say without a live troubleshooting session. What procedure did you follow for the setup?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 08:26:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4581707#M1088753</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-03-30T08:26:58Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication using ADFS SAML</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4582043#M1088775</link>
      <description>&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215935-configure-asa-anyconnect-vpn-with-micros.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215935-configure-asa-anyconnect-vpn-with-micros.html&lt;/A&gt;&lt;BR /&gt;this one&lt;BR /&gt;and also the Microsoft one.&lt;BR /&gt;</description>
      <pubDate>Wed, 30 Mar 2022 15:13:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4582043#M1088775</guid>
      <dc:creator>SPoodari</dc:creator>
      <dc:date>2022-03-30T15:13:16Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication using ADFS SAML</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4582065#M1088776</link>
      <description>ASA# show run webvpn&lt;BR /&gt;webvpn&lt;BR /&gt;enable airtel&lt;BR /&gt;http-headers&lt;BR /&gt;hsts-server&lt;BR /&gt;enable&lt;BR /&gt;max-age 31536000&lt;BR /&gt;include-sub-domains&lt;BR /&gt;no preload&lt;BR /&gt;hsts-client&lt;BR /&gt;enable&lt;BR /&gt;x-content-type-options&lt;BR /&gt;x-xss-protection&lt;BR /&gt;content-security-policy&lt;BR /&gt;anyconnect enable&lt;BR /&gt;saml idp &lt;A href="https://sts.windows.net/xxxxxxxxxxxxxxxxxxxx-6b133e33c70e/" target="_blank"&gt;https://sts.windows.net/xxxxxxxxxxxxxxxxxxxx-6b133e33c70e/&lt;/A&gt;&lt;BR /&gt;url sign-in &lt;A href="https://login.microsoftonline.com/xxxxxxxxxxxxxxxxxxxxxx6b133e33c70e/saml2" target="_blank"&gt;https://login.microsoftonline.com/xxxxxxxxxxxxxxxxxxxxxx6b133e33c70e/saml2&lt;/A&gt;&lt;BR /&gt;url sign-out &lt;A href="https://login.microsoftonline.com/xxxxxxxxxxxxxxxxxxxxx6b133e33c70e/saml2" target="_blank"&gt;https://login.microsoftonline.com/xxxxxxxxxxxxxxxxxxxxx6b133e33c70e/saml2&lt;/A&gt;&lt;BR /&gt;base-url &lt;A href="https://vpn.company.com" target="_blank"&gt;https://vpn.company.com&lt;/A&gt;&lt;BR /&gt;trustpoint idp AzureAD-AC-SAML&lt;BR /&gt;trustpoint sp ASDM_TrustPoint3&lt;BR /&gt;no signature&lt;BR /&gt;no force re-authentication&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;error-recovery disable&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;ASA# show run tunnel-group&lt;BR /&gt;tunnel-group Azure-MFA type remote-access&lt;BR /&gt;tunnel-group Azure-MFA general-attributes&lt;BR /&gt;default-group-policy Azure-MFA-GP&lt;BR /&gt;tunnel-group Azure-MFA webvpn-attributes&lt;BR /&gt;authentication saml&lt;BR /&gt;group-alias Azure-MFA enable&lt;BR /&gt;saml identity-provider &lt;A href="https://sts.windows.net/xxxxxxxxxxxxxxxxxxx-6b133e33c70e/" target="_blank"&gt;https://sts.windows.net/xxxxxxxxxxxxxxxxxxx-6b133e33c70e/&lt;/A&gt;</description>
      <pubDate>Wed, 30 Mar 2022 15:33:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4582065#M1088776</guid>
      <dc:creator>SPoodari</dc:creator>
      <dc:date>2022-03-30T15:33:16Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication using ADFS SAML</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4583094#M1088825</link>
      <description>&lt;P&gt;I have attached the logs here.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now my previous issue is cleared.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;but now i'm getting Anyconnect "Authentication failed due to unexpected error". after succesful login with Microsoft.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2025 16:13:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-using-adfs-saml/m-p/4583094#M1088825</guid>
      <dc:creator>SPoodari</dc:creator>
      <dc:date>2025-04-17T16:13:51Z</dc:date>
    </item>
  </channel>
</rss>

