<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA AnyConnect VPN with Microsoft Azure MFA through SAML in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4905285#M1103431</link>
    <description>&lt;P&gt;i resolved this issue by removing Dynamic access policy from ASA.&lt;/P&gt;</description>
    <pubDate>Tue, 15 Aug 2023 11:55:30 GMT</pubDate>
    <dc:creator>Manish Manwal</dc:creator>
    <dc:date>2023-08-15T11:55:30Z</dc:date>
    <item>
      <title>ASA AnyConnect VPN with Microsoft Azure MFA through SAML</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4565543#M1087992</link>
      <description>&lt;P&gt;we configure ASA AnyConnect VPN with Microsoft Azure MFA through SAML. when we connect VPN its given an error "&lt;STRONG&gt;Authentication failed due to problem retrieving the single sign-on cookie&lt;/STRONG&gt;". we have done below troubleshooting.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Restart the ASA.&lt;/LI&gt;&lt;LI&gt;Log in to the ASA via CLI and verify time by issuing the command Show Clock.&lt;UL&gt;&lt;LI&gt;If the time is not correct,&amp;nbsp;verify your&amp;nbsp;NTP&amp;nbsp;time sync configuration.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Set the SAML Identity provider to none, and then set it back to your configured SAML IdP.&lt;/LI&gt;&lt;LI&gt;Remove the SAML configuration from the tunnel group on the ASA, save the configuration temporarily without the SAML configuration.&lt;/LI&gt;&lt;LI&gt;Re-enable SAML Auth in tunnel group via the following commands in the CLI using your Entity ID:&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;ciscoasa(config-tunnel-webvpn)# no saml identity-provider&amp;nbsp;&lt;A href="https://yourserver.example.com/dag/saml2/idp/metadata.php" target="_blank" rel="noopener"&gt;https://&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;ciscoasa(config-tunnel-webvpn)# saml identity-provider&amp;nbsp;&lt;A href="https://yourserver.example.com/dag/saml2/idp/metadata.php" target="_blank" rel="noopener"&gt;https://&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;SPAN&gt;debug the Webvpn and its showing "&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;webvpn_login_primary_username: SAML assertion validation failed&lt;BR /&gt;[SAML] consume_assertion: The profile cannot verify a signature on the message"&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 16:43:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4565543#M1087992</guid>
      <dc:creator>Manish Manwal</dc:creator>
      <dc:date>2022-03-07T16:43:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA AnyConnect VPN with Microsoft Azure MFA through SAML</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4565549#M1087994</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/513674"&gt;@Manish Manwal&lt;/a&gt; judging by the error "cannot verify a signature on the message" - I wonder if the certificate used is not trusted and you've not imported?&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 16:49:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4565549#M1087994</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-07T16:49:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA AnyConnect VPN with Microsoft Azure MFA through SAML</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4565559#M1087996</link>
      <description>&lt;P&gt;hi Rob,&lt;/P&gt;&lt;P&gt;identity provider and service provider both certificate has imported in firewall and both are valid til November&lt;/P&gt;&lt;P&gt;i can also see below error in debug. can you help here ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;func=xmlSecOpenSSLEvpSignatureVerify:file=signatures.c:line=493:obj=rsa-sha256:subj=EVP_VerifyFinal:error=18:data do not match:signature do not match&lt;BR /&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 17:00:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4565559#M1087996</guid>
      <dc:creator>Manish Manwal</dc:creator>
      <dc:date>2022-03-07T17:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA AnyConnect VPN with Microsoft Azure MFA through SAML</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4565984#M1088004</link>
      <description>&lt;P&gt;It's usually due to the Azure certificate having changed. Microsoft updates the certificate when you finalize the app setup in Azure. Double check that the certificate you imported on the ASA is the same one currently presented by Azure.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 04:42:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4565984#M1088004</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-03-08T04:42:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA AnyConnect VPN with Microsoft Azure MFA through SAML</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4566149#M1088024</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;certificate is same, i also download latest certificate and imported to ASA. but same issue.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 10:32:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4566149#M1088024</guid>
      <dc:creator>Manish Manwal</dc:creator>
      <dc:date>2022-03-08T10:32:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA AnyConnect VPN with Microsoft Azure MFA through SAML</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4566168#M1088028</link>
      <description>&lt;P&gt;after import certificate and disable and re enable SAML identity provider, we not receive above error, now we getting "login Denied" error.&lt;/P&gt;&lt;P&gt;can you help here. below is the debug logs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;saml_ac_token_remove: SAML ac token being looked 73289FA84675DBCB096DB69&lt;BR /&gt;saml token ID 73289FA84675DBCB096DB69 removed from table&lt;BR /&gt;[SAML] saml_is_idp_internal: getting SAML config for tg SSL-VPN&lt;BR /&gt;#0x00007fb121de6290 (GET). Request line:/+webvpn+/webvpn_logout.html&lt;BR /&gt;#0x00007fb121de6290 Hand-off to emWeb.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 10:49:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4566168#M1088028</guid>
      <dc:creator>Manish Manwal</dc:creator>
      <dc:date>2022-03-08T10:49:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA AnyConnect VPN with Microsoft Azure MFA through SAML</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4566208#M1088035</link>
      <description>&lt;P&gt;"Login denied" is typically something on the iDP side. You should be able to check the logs there for more details.&lt;/P&gt;
&lt;P&gt;I have seen some people successfully use Fiddler app to debug the https communications between the client and iDP during a SAML authentication process.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.telerik.com/fiddler/configure-fiddler/tasks/decrypthttps" target="_blank"&gt;https://docs.telerik.com/fiddler/configure-fiddler/tasks/decrypthttps&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 12:29:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4566208#M1088035</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-03-08T12:29:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA AnyConnect VPN with Microsoft Azure MFA through SAML</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4566964#M1088062</link>
      <description>&lt;P&gt;i cant find any error in fiddler regarding vpn error.&lt;/P&gt;&lt;P&gt;one more error we are getiing in debuging : Dynamic access policy terminated the connection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but no policy created yet for remote vpn&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 10:41:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4566964#M1088062</guid>
      <dc:creator>Manish Manwal</dc:creator>
      <dc:date>2022-03-09T10:41:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA AnyConnect VPN with Microsoft Azure MFA through SAML</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4699648#M1094044</link>
      <description>&lt;P&gt;I have the SAML authentication taking extreme delay to load the username page, password entry, then verification.&lt;/P&gt;&lt;P&gt;All that takes 7 minutes but at the end is connected with no slowness or asp drops.&lt;/P&gt;&lt;P&gt;Any idea?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Oct 2022 00:36:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4699648#M1094044</guid>
      <dc:creator>Serpent2010</dc:creator>
      <dc:date>2022-10-07T00:36:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA AnyConnect VPN with Microsoft Azure MFA through SAML</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4861855#M1101954</link>
      <description>&lt;P&gt;I am having same issue. Anyconnect&amp;nbsp;authentication failed due to problem retrieving the single sign-on cookie. Configuration is correct, Certs are correct, re-apply config,etc.. One of my ASA is working but the other is having the issue. I get this from debug.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Jun 24 12:37:14 [SAML] consume_assertion: When looking for an assertion we did not found it.&lt;BR /&gt;Jun 24 12:37:14&lt;BR /&gt;[SAML] consume_assertion:&lt;/P&gt;&lt;P&gt;[saml] webvpn_login_primary_username: SAML assertion validation failed&lt;/P&gt;&lt;P&gt;any help would be appreciated.&lt;/P&gt;</description>
      <pubDate>Sat, 24 Jun 2023 19:16:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4861855#M1101954</guid>
      <dc:creator>Eagen OBrien</dc:creator>
      <dc:date>2023-06-24T19:16:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA AnyConnect VPN with Microsoft Azure MFA through SAML</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4861878#M1101956</link>
      <description>&lt;P&gt;Do traffic capture and see the traffic flow behavior.&lt;BR /&gt;The root cause for my case was that the firewall blocked a Microsoft website that was used for the authentication process for SAML.&lt;BR /&gt;The website was blocked because the website was not listed in MS documentation of SAML’s firewall requirements.&lt;BR /&gt;So, I did multiple captures for many users when I noticed all of them trying to reach that website. I opened the ports for that website and immediately fixed it.&lt;/P&gt;</description>
      <pubDate>Sat, 24 Jun 2023 21:15:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4861878#M1101956</guid>
      <dc:creator>Serpent2010</dc:creator>
      <dc:date>2023-06-24T21:15:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA AnyConnect VPN with Microsoft Azure MFA through SAML</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4861913#M1101957</link>
      <description>&lt;P&gt;Verified, and just to make sure I set allow any any to make sure I am not blocking anything and still same issue.&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jun 2023 00:56:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4861913#M1101957</guid>
      <dc:creator>Eagen OBrien</dc:creator>
      <dc:date>2023-06-25T00:56:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA AnyConnect VPN with Microsoft Azure MFA through SAML</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4905284#M1103430</link>
      <description>&lt;P&gt;check if there is any DAP configured in ASA&lt;/P&gt;</description>
      <pubDate>Tue, 15 Aug 2023 11:54:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4905284#M1103430</guid>
      <dc:creator>Manish Manwal</dc:creator>
      <dc:date>2023-08-15T11:54:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA AnyConnect VPN with Microsoft Azure MFA through SAML</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4905285#M1103431</link>
      <description>&lt;P&gt;i resolved this issue by removing Dynamic access policy from ASA.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Aug 2023 11:55:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-with-microsoft-azure-mfa-through-saml/m-p/4905285#M1103431</guid>
      <dc:creator>Manish Manwal</dc:creator>
      <dc:date>2023-08-15T11:55:30Z</dc:date>
    </item>
  </channel>
</rss>

