<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SAML Redundancy for Cisco ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4454450#M1083133</link>
    <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately, the bug is still not resolved.&amp;nbsp; Upgraded to 9.16(1) and did a failover test and tried to sign on to Azure SSO while the standby ASA (Firepower 2130 running in ASA mode only) was acting as primary, I get "Potential CSR attack detected", see attached.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know what might be causing this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have an failover license but the new model I believe only requires one license on the primary as it is a shared licensing (i.e., a secondary license is not required on the standby).&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, is there anything required for licensing to be activated on the standby ASA? Show license status shows Smart Licensing is enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;LN&lt;/P&gt;</description>
    <pubDate>Wed, 25 Aug 2021 01:27:50 GMT</pubDate>
    <dc:creator>latenaite2011</dc:creator>
    <dc:date>2021-08-25T01:27:50Z</dc:date>
    <item>
      <title>SAML Redundancy for Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4442638#M1082642</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have customer who&amp;nbsp; has an ASA in Active/Standby mode and have SAML Single-Sign-On configured.&amp;nbsp; The SAML SSO works fine but during failover, it gave and error "Authentication failed due to problem retrieving the single sign-on cookie.&amp;nbsp; I did further research and the issue seems to be related to Bug CSCvi23605- Re-enable SAML to make config changes take effect.&amp;nbsp;&amp;nbsp;We had to reload the standby for it to work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just wondering if there is a permanent fix for this and when it is expected to be release.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 02 Aug 2021 04:54:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4442638#M1082642</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2021-08-02T04:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Redundancy for Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4443015#M1082659</link>
      <description>&lt;P&gt;The BugID inidicates it's fixed in ASA 9.16(1).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Aug 2021 18:25:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4443015#M1082659</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-08-02T18:25:45Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Redundancy for Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4443032#M1082663</link>
      <description>&lt;P&gt;Thank you Marvin for the response!&amp;nbsp; I appreciate it!&lt;/P&gt;</description>
      <pubDate>Mon, 02 Aug 2021 19:11:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4443032#M1082663</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2021-08-02T19:11:58Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Redundancy for Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4454450#M1083133</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately, the bug is still not resolved.&amp;nbsp; Upgraded to 9.16(1) and did a failover test and tried to sign on to Azure SSO while the standby ASA (Firepower 2130 running in ASA mode only) was acting as primary, I get "Potential CSR attack detected", see attached.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know what might be causing this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have an failover license but the new model I believe only requires one license on the primary as it is a shared licensing (i.e., a secondary license is not required on the standby).&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, is there anything required for licensing to be activated on the standby ASA? Show license status shows Smart Licensing is enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;LN&lt;/P&gt;</description>
      <pubDate>Wed, 25 Aug 2021 01:27:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4454450#M1083133</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2021-08-25T01:27:50Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Redundancy for Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4454897#M1083153</link>
      <description>&lt;P&gt;Licensing should not cause an issue here.&lt;/P&gt;
&lt;P&gt;While trying the AnyConnect client logon, run "debug webvpn saml 255" and capture the output. That should show some more useful details about what's failing.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Aug 2021 17:55:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4454897#M1083153</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-08-25T17:55:04Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Redundancy for Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4454927#M1083155</link>
      <description>&lt;P&gt;Ok thanks Marvin.&amp;nbsp; Is there a way for me to test this while it is running in Standby mode?&amp;nbsp; I am trying to avoid another maintenance mode if possible.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Aug 2021 18:50:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4454927#M1083155</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2021-08-25T18:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Redundancy for Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4456318#M1083196</link>
      <description>&lt;P&gt;You can't login to VPN on the unit while it is in Standby unit. Only the Active unit can handle that task.&lt;/P&gt;</description>
      <pubDate>Sat, 28 Aug 2021 14:15:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4456318#M1083196</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-08-28T14:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Redundancy for Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4469128#M1083801</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was able to capture the "debug webvpn saml 255" while the standby ASA is active.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is what I see during the Anyconnect attempts:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;%ASA-3-716162: Failed to consume SAML assertion. reason: assertion is expired or not valid.&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;SAML] consume_assertion:&lt;/P&gt;&lt;P class="p1"&gt;PHNhbWxwOlJlc3BvbnNlIElEPSJfYmIxZDNlMmUtNmFmNS00MTBhLThiM2QtYzg4MDZkNDU3YzQ1IiBWZXJzaW9uPSIyLjAiIElzc3VlSW5zdGFudD0iMjAyMS0wOS0xN1QwMjo0NToyNi4zNzRaIiBEZXN0aW5hdGlvbj0iaHR0cHM6Ly9hc2EucGFyYy5jb20vK0NTQ09FKy9zYW1sL3NwL2Fjcz90Z25hbWU9QXp1cmVTU08iIEluUmVzcG9uc2VUbz0iX0Q5RjZFNzMxNzM1QzE1RkRDQzMxMjIyRUE2NkIxQzZCIiB4bWxuczpzYW1scD0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6Mi4wOnByb3RvY29sIj48SXNzdWVyIHhtbG5zPSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6YXNzZXJ0aW9uIj5odHRwczovL3N0cy53aW5kb3dzLm5ldC83MzNkNjkwMy1jOWYxLTRhMGYtYjA1Yi1kNzVlZGRiNTJkMGQvPC9Jc3N1ZXI+PHNhbWxwOlN0YXR1cz48c2FtbHA6U3RhdHVzQ29kZSBWYWx1ZT0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6Mi4wOnN0YXR1czpTdWNjZXNzIi8+PC9zYW1scDpTdGF0dXM+PEFzc2VydGlvbiBJRD0iX2Y3OThjMWI3LWZkOGYtNDczYy04NTJiLWEwOTkx.....&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;[SAML] consume_assertion: assertion is expired or not valid&lt;/P&gt;&lt;P class="p1"&gt;[SAML] consume_assertion&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;I found this URL here that mentions about time not synced:&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215935-configure-asa-anyconnect-vpn-with-micros.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215935-configure-asa-anyconnect-vpn-with-micros.pdf&lt;/A&gt;&lt;/P&gt;&lt;P class="p1"&gt;[SAML] consume_assertion: assertion is expired or not valid&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;Problem 1. ASA time not synced with IdP’s time.&lt;/P&gt;&lt;P class="p1"&gt;Solution 1. Configure ASA with the same NTP server used by IdP.&lt;/P&gt;&lt;P class="p1"&gt;Problem 2. The assertion is not valid between the specified time.&lt;/P&gt;&lt;P class="p1"&gt;Solution 2. Modify the timeout value configured on the ASA.&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;Not sure about this since it works on the primary ASA and the second ASA has the same configuration as the primary so why would this happen only on the secondary ASA (didn't check the time during the maintenance window and I am analyzing the debug now and just found this solution recommendation).&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Sat, 18 Sep 2021 03:21:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4469128#M1083801</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2021-09-18T03:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Redundancy for Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4470445#M1083852</link>
      <description>&lt;P&gt;Hey Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just wondering if you have any suggestions to the debug captured on the standby ASA.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;LN&lt;/P&gt;</description>
      <pubDate>Tue, 21 Sep 2021 04:03:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4470445#M1083852</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2021-09-21T04:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Redundancy for Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4471322#M1083900</link>
      <description>&lt;P&gt;You should be able to verify the time (clock and ntp status) on the secondary unit even while it's in standby role. Even if you cannot log into it directly, you can run the commands from the active unit:&lt;/P&gt;
&lt;PRE&gt;failover exec standby show clock
failover exec standby show ntp assoc&lt;/PRE&gt;</description>
      <pubDate>Wed, 22 Sep 2021 12:48:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4471322#M1083900</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-09-22T12:48:01Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Redundancy for Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4471590#M1083913</link>
      <description>Hey Marvin,&lt;BR /&gt;&lt;BR /&gt;Thanks for the reply.&lt;BR /&gt;&lt;BR /&gt;I checked the clock and there is only a difference of 3 minutes from the&lt;BR /&gt;primary to the secondary ASA and the ntp association is very similar.&lt;BR /&gt;&lt;BR /&gt;I don't think the 3 minutes difference should matter.&lt;BR /&gt;&lt;BR /&gt;Let me know if there is any other suggestions?&lt;BR /&gt;&lt;BR /&gt;thanks!&lt;BR /&gt;</description>
      <pubDate>Wed, 22 Sep 2021 18:51:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4471590#M1083913</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2021-09-22T18:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Redundancy for Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4471616#M1083914</link>
      <description>&lt;P&gt;3 minutes would indeed matter. SAML assertions are only valid from the time issued until 30 seconds after issuance. If the standby ASA clock is off by 3 minutes (either plus or minus) it won't see the assertion as valid.&lt;/P&gt;
&lt;P&gt;If it is indeed ntp-synchronized then the clock should be accurate within subsecond accuracy.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Sep 2021 19:53:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4471616#M1083914</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-09-22T19:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Redundancy for Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4488999#M1084491</link>
      <description>&lt;P&gt;Thanks Marvin for your help.&amp;nbsp; It was a time issue that was off that caused the standby ASA to not work for the SAML SSO for the VPN cleints.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 07:40:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/saml-redundancy-for-cisco-asa/m-p/4488999#M1084491</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2021-10-20T07:40:32Z</dc:date>
    </item>
  </channel>
</rss>

