<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure AD MFA with Cisco AnyConnect not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4698093#M1093939</link>
    <description>&lt;P&gt;Having trouble with this myself. Are you all saying whats in the cisco AND MS doc is wrong? They both say&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;htps/&amp;lt;YOUR_CISCO_ANYCONNECT_FQDN&amp;gt;/+CSCOE+/saml/sp/acs?tgname=&amp;lt;Tunnel_Group_Name&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;but its needs to all be caps?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 04 Oct 2022 12:40:30 GMT</pubDate>
    <dc:creator>sysad43</dc:creator>
    <dc:date>2022-10-04T12:40:30Z</dc:date>
    <item>
      <title>Azure AD MFA with Cisco AnyConnect not working</title>
      <link>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4581646#M1088748</link>
      <description>&lt;P&gt;Simple setup but going me crazy since yesterday.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco ASA Firepower 1010 with Anyconnect integration to Azure SAML.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have followed the Cisco and MIcrosoft documents and configured exactly as mentioned (for about 5 times literally till now).&amp;nbsp;&lt;/P&gt;&lt;P&gt;While i'm trying to connect, i can see the Azure login prompt, Azure singing me in, then HTML page not found response coming.&amp;nbsp;&lt;/P&gt;&lt;H1&gt;&lt;SPAN&gt;This&amp;nbsp;vpn.company.com&amp;nbsp;page can’t be found&lt;/SPAN&gt;&lt;/H1&gt;&lt;P&gt;No webpage was found for the web address:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;A href="https://vpn.compnay.com/+CSCOE+/SAML/SP/ACS?tgname=Azure-MFA" target="_blank" rel="noopener"&gt;https://vpn.compnay.com/+CSCOE+/SAML/SP/ACS?tgname=Azure-MFA&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV class=""&gt;HTTP ERROR 404&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've enabled debugs and couldn't find anything.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mar 30 17:29:24 [SAML] get_lasso_signature_method:&lt;BR /&gt;Use SHA256 in SAML Request&lt;BR /&gt;Mar 30 17:29:24 [SAML] saml_add_config: SAML config added to list&lt;/P&gt;&lt;P&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;Public archive directives retrieved from cache for index 1.&lt;BR /&gt;Mar 30 17:29:37&lt;BR /&gt;[SAML] build_authnrequest:&lt;BR /&gt;&lt;A href="https://login.microsoftonline.com/23e274fb-1240-4362-9b03-6b133e33c70e/saml2?SAMLRequest=fVLLTsMwEPyVyPfEsd0m1GorhT6kSoAQIA5ckJtuqCXHDl6nPL4eJwipHOA6O7M7M%2FYcVWs6WfXhaO%2FgtQcMyXtrLMpxsCC9t9Ip1CitagFlqOV9dX0leZbLzrvgamfImeR%2FhUIEH7SzJNmtF%2BSZbTe5KASfCFZNL2d8U1SbsixYVTI%2BvShXJHkEj5G%2FIFEeRYg97CwGZUOEcs7TXKQif2BMTmdSlE8kWccM2qowqo4hdCgpNe5F26zVtXfomuCs0Ray2rWUC%2BDlpNmnjE%2FydCIKns72cWmxZ0KAEHWZAx2ScZJsna9h7GpBGmUQBke3MZQ%2BwQ%2BynA9kOTr1y5%2F7p86yLA5O6vChxrsDi2JHWwjqoIKi1WfvIb3eVnN6vmH%2B%2FUI3scvd%2BtYZXX8MPloV%2Fq6aZWxE9CFtRqrsLXZQ60bDgSSVMe5t5UGF6Dr4Hghdfh%2F9%2FROWXw%3D%3D&amp;amp;SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&amp;amp;Signature=k6uKzSQdDs6zsnNGuvxqmxiAngha16ioBeL7k%2Fm3fwKWr8ITjGT6U9RC9oFkvhhawIRQ0GGnOYgEAQM8GFYKqrhFCYPGDKi2zYhSKq0HrL1C2l1SF5u55eTu2ZmagjJp4ELD2KW0v8nRITECOBgJPMFqn%2FDsRbomASFu1UKnXKsewqcQXaMix%2BNuydekXOJ6YqWRpXVaSTc4g02NcyV2rje8zaTkFoxRSxBEOLLrKtoRmRpgKRc7uRKEiexxuSeQHgCa7jcnOHKo4WYx2wuu9pjyy4qVAyzFPzddz1UlYOXHvXeF7xRHxWPRu8w7vwx1S5jBy2Vc0eTOEh%2BrUG%2BG0Q%3D%3D" target="_blank" rel="noopener"&gt;https://login.microsoftonline.com/23e274fb-1240-4362-9b03-6b133e33c70e/saml2?SAMLRequest=fVLLTsMwEPyVyPfEsd0m1GorhT6kSoAQIA5ckJtuqCXHDl6nPL4eJwipHOA6O7M7M%2FYcVWs6WfXhaO%2FgtQcMyXtrLMpxsCC9t9Ip1CitagFlqOV9dX0leZbLzrvgamfImeR%2FhUIEH7SzJNmtF%2BSZbTe5KASfCFZNL2d8U1SbsixYVTI%2BvShXJHkEj5G%2FIFEeRYg97CwGZUOEcs7TXKQif2BMTmdSlE8kWccM2qowqo4hdCgpNe5F26zVtXfomuCs0Ray2rWUC%2BDlpNmnjE%2FydCIKns72cWmxZ0KAEHWZAx2ScZJsna9h7GpBGmUQBke3MZQ%2BwQ%2BynA9kOTr1y5%2F7p86yLA5O6vChxrsDi2JHWwjqoIKi1WfvIb3eVnN6vmH%2B%2FUI3scvd%2BtYZXX8MPloV%2Fq6aZWxE9CFtRqrsLXZQ60bDgSSVMe5t5UGF6Dr4Hghdfh%2F9%2FROWXw%3D%3D&amp;amp;SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&amp;amp;Signature=k6uKzSQdDs6zsnNGuvxqmxiAngha16ioBeL7k%2Fm3fwKWr8ITjGT6U9RC9oFkvhhawIRQ0GGnOYgEAQM8GFYKqrhFCYPGDKi2zYhSKq0HrL1C2l1SF5u55eTu2ZmagjJp4ELD2KW0v8nRITECOBgJPMFqn%2FDsRbomASFu1UKnXKsewqcQXaMix%2BNuydekXOJ6YqWRpXVaSTc4g02NcyV2rje8zaTkFoxRSxBEOLLrKtoRmRpgKRc7uRKEiexxuSeQHgCa7jcnOHKo4WYx2wuu9pjyy4qVAyzFPzddz1UlYOXHvXeF7xRHxWPRu8w7vwx1S5jBy2Vc0eTOEh%2BrUG%2BG0Q%3D%3D&lt;/A&gt;&lt;BR /&gt;[SAML] saml_is_idp_internal: getting SAML config for tg Azure-MFA&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;BR /&gt;SAML AUTH: SAML hash table cleanup periodic task&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 06:43:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4581646#M1088748</guid>
      <dc:creator>SPoodari</dc:creator>
      <dc:date>2022-03-30T06:43:47Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA with Cisco AnyConnect not working</title>
      <link>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4581721#M1088756</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;there is possible you missed any steps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please follow below tutorial that will guide you to step by step SAMLconfig .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=ORC0_0wsbQk" target="_blank"&gt;https://www.youtube.com/watch?v=ORC0_0wsbQk&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Jitendra&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 08:47:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4581721#M1088756</guid>
      <dc:creator>Jitendra Kumar</dc:creator>
      <dc:date>2022-03-30T08:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA with Cisco AnyConnect not working</title>
      <link>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4581732#M1088758</link>
      <description>&lt;P&gt;Hi Jitendra,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have followed literally each and every video on youtube on this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;but just now its came into light, that do we need anyconnect apex licenses for this to work? Any idea?&lt;/P&gt;&lt;P&gt;As per the documentation only Apex support SAML, we have AnyConnect VPN Peers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sampath&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 09:04:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4581732#M1088758</guid>
      <dc:creator>SPoodari</dc:creator>
      <dc:date>2022-03-30T09:04:56Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA with Cisco AnyConnect not working</title>
      <link>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4581753#M1088760</link>
      <description>&lt;P&gt;I can see apex licenses added more capabilities to any connect VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below are the documents where SAML Authentication is also included.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/200191-AnyConnect-Licensing-Frequently-Asked-Qu.html#anc8" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/200191-AnyConnect-Licensing-Frequently-Asked-Qu.html#anc8&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also you can take help from below documents if its help you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.optanix.com/practical-guide-deploying-saml-anyconnect/" target="_blank"&gt;https://www.optanix.com/practical-guide-deploying-saml-anyconnect/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Jitendra&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 09:44:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4581753#M1088760</guid>
      <dc:creator>Jitendra Kumar</dc:creator>
      <dc:date>2022-03-30T09:44:57Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA with Cisco AnyConnect not working</title>
      <link>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4596162#M1089355</link>
      <description>&lt;P&gt;We had the same fault. Runnin 7.0.1 ftd.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Had to change url in app settings in azure.&lt;/P&gt;&lt;P&gt;Replace the capital letters as follows.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;A href="https://vpn.compnay.com/+CSCOE+/saml/sp/acs?tgname=Azure-MFA" target="_blank"&gt;https://vpn.compnay.com/+CSCOE+/saml/sp/acs?tgname=Azure-MFA&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This worked for us, neither TAC or our cisco partner where able to figure it out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2022 14:25:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4596162#M1089355</guid>
      <dc:creator>Jostein</dc:creator>
      <dc:date>2022-04-20T14:25:44Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA with Cisco AnyConnect not working</title>
      <link>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4596508#M1089369</link>
      <description>&lt;P&gt;That's true, same worked for me as well. in my URL we have&amp;nbsp;SAML/SP/ACS in caps.&lt;/P&gt;&lt;P&gt;The URL is freaking case sensitive.. where in the world a URL is case sensitive only god knows.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Apr 2022 03:18:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4596508#M1089369</guid>
      <dc:creator>SPoodari</dc:creator>
      <dc:date>2022-04-21T03:18:28Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA with Cisco AnyConnect not working</title>
      <link>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4596627#M1089373</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1230563"&gt;@SPoodari&lt;/a&gt; the value of the tgname in&amp;nbsp; &lt;STRONG&gt;&lt;A href="https://vpn.compnay.com/+CSCOE+/SAML/SP/ACS?tgname=Azure-MFA" target="_blank" rel="noopener nofollow noreferrer"&gt;https://vpn.company.com/+CSCOE+/SAML/SP/ACS?tgname=Azure-MFA&lt;/A&gt;&lt;/STRONG&gt; is case sensitive. The tgname is the tunnel-group (or connection profile as referred to in ASDM) that is using SAML authentication. You should be able to verify it by point to the metadata page for the tunnel-group (as referenced in your AnyConnect enterprise app in Azure AD).&lt;/P&gt;
&lt;P&gt;FYI the portion of a URL after the domain name (sometimes referred to as the URI) is and has always been case-sensitive.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2022 13:19:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4596627#M1089373</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-10-04T13:19:51Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA with Cisco AnyConnect not working</title>
      <link>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4669849#M1092709</link>
      <description>&lt;P&gt;not only case sensitive, the syntax is already different. Microsoft says:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;htetepes : / / YOUR_CISCO_ANYCONNECT_FQDN/+CSCOE+/SAML/SP/ACS&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks to the solution in this thread I finally made it... took 2 days to sort everything out...&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Aug 2022 09:51:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4669849#M1092709</guid>
      <dc:creator>Erik Hoffmann</dc:creator>
      <dc:date>2022-08-16T09:51:49Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA with Cisco AnyConnect not working</title>
      <link>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4698093#M1093939</link>
      <description>&lt;P&gt;Having trouble with this myself. Are you all saying whats in the cisco AND MS doc is wrong? They both say&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;htps/&amp;lt;YOUR_CISCO_ANYCONNECT_FQDN&amp;gt;/+CSCOE+/saml/sp/acs?tgname=&amp;lt;Tunnel_Group_Name&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;but its needs to all be caps?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2022 12:40:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4698093#M1093939</guid>
      <dc:creator>sysad43</dc:creator>
      <dc:date>2022-10-04T12:40:30Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA with Cisco AnyConnect not working</title>
      <link>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4698115#M1093944</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/212266"&gt;@sysad43&lt;/a&gt; the section &amp;lt;YOUR_CISCO_ANYCONNECT_FQDN&amp;gt; is not case-sensitive. You replace your VPN address with that section (omitting the &amp;lt;&amp;gt; symbols). The remainder of the URI is case-sensitive, including the +CSCOE+ string and &amp;lt;Tunnel_Group_Name&amp;gt; section. For the last section, replace your tunnel-group name exactly as it appears in your running configuration, including any capitalization.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2022 13:22:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4698115#M1093944</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-10-04T13:22:35Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA with Cisco AnyConnect not working</title>
      <link>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4698118#M1093946</link>
      <description>&lt;P&gt;Right, but above people seem to be saying that the SAML/SP/ACS part also needs to be caps. It isnt in the docs.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2022 13:25:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4698118#M1093946</guid>
      <dc:creator>sysad43</dc:creator>
      <dc:date>2022-10-04T13:25:28Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA with Cisco AnyConnect not working</title>
      <link>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4699245#M1094018</link>
      <description>&lt;P&gt;Ive tried it both ways and still get same 404 error after MFA signin. One thing Im unsure of is, do I need to enable SSL access on the outside interface for this to work? We only have IKE2 enabled.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2022 13:35:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4699245#M1094018</guid>
      <dc:creator>sysad43</dc:creator>
      <dc:date>2022-10-06T13:35:02Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA with Cisco AnyConnect not working</title>
      <link>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4699448#M1094033</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/212266"&gt;@sysad43&lt;/a&gt;&amp;nbsp; Azure AD will be replying to the firewall via https to the SP (service Provider in SAML terminology) URL so, yes, SSL must be enabled.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2022 17:43:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4699448#M1094033</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-10-06T17:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA with Cisco AnyConnect not working</title>
      <link>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4701913#M1094170</link>
      <description>&lt;P&gt;I figured as much. Im just subbing as the network admin while we try to find someone who wants the job, so Im learning as I go. I will try this as soon as I get the latest interim patch installed.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 12:35:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4701913#M1094170</guid>
      <dc:creator>sysad43</dc:creator>
      <dc:date>2022-10-12T12:35:10Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA with Cisco AnyConnect not working</title>
      <link>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4778586#M1098000</link>
      <description>&lt;P&gt;also worked for me, changed SAML and SP to lowercase and worked.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Feb 2023 14:11:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-ad-mfa-with-cisco-anyconnect-not-working/m-p/4778586#M1098000</guid>
      <dc:creator>Mike Schooley</dc:creator>
      <dc:date>2023-02-20T14:11:09Z</dc:date>
    </item>
  </channel>
</rss>

