<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco FMC and SAML in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696615#M1093811</link>
    <description>&lt;P&gt;Good question! I don't think AD can provide any type of authorization, I think you would need to use a RADIUS server to set those attributes. Do you have any RADIUS server in your environment?&lt;/P&gt;</description>
    <pubDate>Fri, 30 Sep 2022 08:36:09 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2022-09-30T08:36:09Z</dc:date>
    <item>
      <title>Cisco FMC and SAML</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696589#M1093806</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We have Cisco FMC\FTD (Version is 7.0.1) integrated with Azure SAML for Anyconnect MFA, also done integration with Active Directory for other purposes. Authentication works, I can connect to the Anyconnect. But now I need to also provide Authorization (For example, User1 must have access to some servers, but User2 doesn't). How I can do this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I add Authorization in Profile settings, then Authentication is failed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IrakliGvishiani_0-1664522001365.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/163790i426960B43672DF6B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="IrakliGvishiani_0-1664522001365.png" alt="IrakliGvishiani_0-1664522001365.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;How I can configure Azure SAML + Authorization by AD Groups?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 09:22:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696589#M1093806</guid>
      <dc:creator>Imm</dc:creator>
      <dc:date>2022-09-30T09:22:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC and SAML</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696615#M1093811</link>
      <description>&lt;P&gt;Good question! I don't think AD can provide any type of authorization, I think you would need to use a RADIUS server to set those attributes. Do you have any RADIUS server in your environment?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 08:36:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696615#M1093811</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-09-30T08:36:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC and SAML</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696639#M1093819</link>
      <description>&lt;P&gt;Yes, I have Windows NPS Radius Server, which we use for WIFI-Authentication. Also we have Cisco ACS, but we use it just for TACACS.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 09:26:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696639#M1093819</guid>
      <dc:creator>Imm</dc:creator>
      <dc:date>2022-09-30T09:26:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC and SAML</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696641#M1093820</link>
      <description>&lt;P&gt;I would recommend using ACS, set up the authorization rules to match the users based on their AD group, or even usernames, and then associate the rules with dACLs where you can define their access level. I would also turn on CoA on the FTD and configure the ACS as the authorization server. Also, please keep in mind that you can actually use the ACS for both authentication and authorization, in that case the FTD will point to the ACS and then the ACS will check the users identities against the AD.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 09:32:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696641#M1093820</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-09-30T09:32:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC and SAML</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696648#M1093822</link>
      <description>&lt;P&gt;But If I use ACS also for authentication, then I need to integrate ACS with Azure-SAML, correct?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 09:42:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696648#M1093822</guid>
      <dc:creator>Imm</dc:creator>
      <dc:date>2022-09-30T09:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC and SAML</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696654#M1093823</link>
      <description>&lt;P&gt;Yeah that's right, however, to keep things simple, you can leave the authentication as is and just use ACS for authorization.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 10:05:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696654#M1093823</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-09-30T10:05:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC and SAML</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696661#M1093825</link>
      <description>&lt;P&gt;Yes, as I see ACS doesn't support SAML.&lt;/P&gt;&lt;P&gt;I will try, thanks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 10:20:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696661#M1093825</guid>
      <dc:creator>Imm</dc:creator>
      <dc:date>2022-09-30T10:20:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC and SAML</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696700#M1093830</link>
      <description>&lt;P&gt;I didn't know that, thanks for sharing and you're welcome.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 11:41:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696700#M1093830</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-09-30T11:41:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC and SAML</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696885#M1093850</link>
      <description>&lt;P&gt;If you have a RADIUS server (NPS, ISE, old ACS etc.) you can use it for Authorization separately from the Azure AD you use for Authentication via the SAML method.&lt;/P&gt;
&lt;P&gt;ISE TME Jason Maynard has created a YouTube video demonstrating the procedure step-by-step:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=gcIQL2VJoR0" target="_blank"&gt;https://www.youtube.com/watch?v=gcIQL2VJoR0&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 16:40:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696885#M1093850</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-09-30T16:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC and SAML</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696951#M1093859</link>
      <description>&lt;P&gt;I will try dACL, as has suggested Aref Alsouqi, because I don't have ISE and unfortunatelly ACS doesn't has capavilities of ISE.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure why FTD Anyconnect bypass traffic after SAML Authentication... But with dACL I can configure some kind of restricted accesses. But in this case I will lose NGFW capabilities of FTD (I mean, for example, IPS), am I correct?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 19:13:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4696951#M1093859</guid>
      <dc:creator>Imm</dc:creator>
      <dc:date>2022-09-30T19:13:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC and SAML</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4697162#M1093879</link>
      <description>&lt;P&gt;ACS is capable of applying Authorization results based on a RADIUS authentication.&lt;/P&gt;
&lt;P&gt;Even if you apply a dACL you still retain the ability to inspect traffic with the full capabilities of the FTD.&lt;/P&gt;</description>
      <pubDate>Sun, 02 Oct 2022 03:11:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4697162#M1093879</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-10-02T03:11:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC and SAML</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4708194#M1094443</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have additional question:&lt;/P&gt;&lt;P&gt;I just will do authorization trough Cisco ACS for providing limited accesses (dACL) and then I will create one rule on FMC itself with "monitor" in Action field and apply, for example, IPS, correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2022 15:09:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4708194#M1094443</guid>
      <dc:creator>Imm</dc:creator>
      <dc:date>2022-10-24T15:09:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC and SAML</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4710531#M1094514</link>
      <description>&lt;P&gt;I configured our FMC in several ways:&lt;/P&gt;&lt;P&gt;1 - I configured Radius Server object on FMC, enable\disabled Dynamic Authentication, but nothing works. On Radius server itself I see next logs:&lt;/P&gt;&lt;P&gt;ACSVersion=acs-5.8.0.32-B.442.x86_64 : ConfigVersionId=140 : Device Port=61652 : RadiusPacketType=AccessRequest : Protocol=Radius : Called-Station-ID=95.*.*.246 : CVPN3000/ASA/PIX7.x-DAP-Tunnel-Group-Name=Anyconnect : AD-User-Candidate-Identities=irakli.gvishiani@*.com : StepData=9=Irakli.Gvishiani@*.com : StepData=10=*.com : StepData=11=*.com : StepData=13=STATUS_WRONG_PASSWORD,ERROR_INVALID_PASSWORD,irakli.gvishiani@*.com : Device IP Address=172.31.254.253&lt;/P&gt;&lt;P&gt;2 - I configured Radius Server object on FMC and enable just Authorization (Authorize only), but nothing works. On Radius server itself I see next logs:&lt;/P&gt;&lt;P&gt;ACSVersion=acs-5.8.0.32-B.442.x86_64 : ConfigVersionId=141 : Device Port=61652 : RadiusPacketType=AccessRequest : Protocol=Radius : Service-Type=Authorize Only : Called-Station-ID=95.*.*.246 : CVPN3000/ASA/PIX7.x-DAP-Tunnel-Group-Name=Anyconnect : DetailedInfo=UserName or Password is missing : Device IP Address=172.31.254.253&lt;/P&gt;</description>
      <pubDate>Wed, 26 Oct 2022 12:07:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4710531#M1094514</guid>
      <dc:creator>Imm</dc:creator>
      <dc:date>2022-10-26T12:07:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC and SAML</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4710669#M1094518</link>
      <description>&lt;P&gt;Also in Authentication I see that username appeared with domain postfix, can It be problem?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IrakliGvishiani_2-1666786397974.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/166359iFBF89D970224B25D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="IrakliGvishiani_2-1666786397974.png" alt="IrakliGvishiani_2-1666786397974.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because also I use Tacacs for User Authentication\Authorization for Device Access and there usernames are without domain postfix:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IrakliGvishiani_1-1666786327785.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/166358i10384F894EF4B85B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="IrakliGvishiani_1-1666786327785.png" alt="IrakliGvishiani_1-1666786327785.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Oct 2022 12:18:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4710669#M1094518</guid>
      <dc:creator>Imm</dc:creator>
      <dc:date>2022-10-26T12:18:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC and SAML</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4712706#M1094596</link>
      <description>&lt;P&gt;Have anybody already done SAML + Authorization by AD Groups somehow?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2022 10:47:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-and-saml/m-p/4712706#M1094596</guid>
      <dc:creator>Imm</dc:creator>
      <dc:date>2022-10-28T10:47:44Z</dc:date>
    </item>
  </channel>
</rss>

