<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anyconnect with SAML connection issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/5222668#M1117477</link>
    <description>Hello Marvin,&lt;BR /&gt;&lt;BR /&gt;Thanks for responding. I checked all of them and they looked fine. Then I&lt;BR /&gt;came across this cisco bug id (&lt;BR /&gt;&lt;A href="https://quickview.cloudapps.cisco.com/quickview/bug/CSCvi23605" target="_blank"&gt;https://quickview.cloudapps.cisco.com/quickview/bug/CSCvi23605&lt;/A&gt;). So&lt;BR /&gt;deleting the SAML config and reconfiguring worked for me. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;Appreciate your quick response.&lt;BR /&gt;</description>
    <pubDate>Mon, 11 Nov 2024 12:55:15 GMT</pubDate>
    <dc:creator>engineer467</dc:creator>
    <dc:date>2024-11-11T12:55:15Z</dc:date>
    <item>
      <title>Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4750945#M1096538</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I have configured Cisco AnyConnect to authenticate with SAML and O365.&lt;/P&gt;&lt;P&gt;When I connect, I am presented with the login page at which point I enter the password and then authenticate from my mobile phone. However, when it's 'authenticated' I get a message saying, 'You are Disconnected. You may now close this browser tab'.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have also noticed that even though it's gone through, the VPN doesn't actually connect.&lt;/P&gt;&lt;P&gt;The only thing that I have noticed which looks odd to me is that the 'Login URL' and the 'Logout' URL appear to both be the same in the Azure side SAML page.&lt;/P&gt;&lt;P&gt;***Just found this message when authenticating: "&lt;STRONG&gt;Failed to consume SAML assertion. reason: The profile cannot verify a signature on the message.&lt;/STRONG&gt;&lt;SPAN&gt;"&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Have tried to re-enable SAML auth in tunnel-group but no luck.***&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for reading and any questions, please let me know.&lt;/P&gt;&lt;P&gt;Steven&lt;/P&gt;</description>
      <pubDate>Sun, 08 Jan 2023 13:10:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4750945#M1096538</guid>
      <dc:creator>StevenEdmunds6666</dc:creator>
      <dc:date>2023-01-08T13:10:32Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4750950#M1096539</link>
      <description>&lt;P&gt;check and validate the config as per below document or post the config here :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215935-configure-asa-anyconnect-vpn-with-micros.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215935-configure-asa-anyconnect-vpn-with-micros.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;as suggest bottom of the page run debug to get what causing the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Jan 2023 13:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4750950#M1096539</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-01-08T13:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4750953#M1096540</link>
      <description>&lt;P&gt;Thank you for this; I have run the 4 debug commands from the bottom and produced the following results:&lt;/P&gt;&lt;P&gt;Steven&lt;/P&gt;</description>
      <pubDate>Sun, 08 Jan 2023 13:27:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4750953#M1096540</guid>
      <dc:creator>StevenEdmunds6666</dc:creator>
      <dc:date>2023-01-08T13:27:34Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4750961#M1096542</link>
      <description>&lt;P&gt;&lt;STRONG&gt;[saml] webvpn_login_primary_username: SAML assertion validation failed&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;check the below thread may help to fix&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/vpn/anyconnect-authentication-using-microsoft-adfs-saml/td-p/3479195" target="_blank"&gt;https://community.cisco.com/t5/vpn/anyconnect-authentication-using-microsoft-adfs-saml/td-p/3479195&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Jan 2023 14:15:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4750961#M1096542</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-01-08T14:15:26Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4750983#M1096546</link>
      <description>&lt;P&gt;Thanks BB, I think I'm getting closer to it but have a question regarding the SAML metadata XML.&lt;BR /&gt;&lt;BR /&gt;Compared to the one provided in the article you provided, the only that I can see that's different is the section head 'SPSSODescriptor' returns as 'AuthnRequestsSigned="false"' whereas their returns as 'true'.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have included if you wish to see...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On top of that, as I go further into the article, it suggests that I need to configure a SAML 2.0 IDP but I'm not sure where in the process this should be going when following the article in your first response.&lt;/P&gt;&lt;P&gt;Just as a sidenote, do I need a vaild SSO cert or can I get away with using the router signed? Currently testing without one.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Steven&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Jan 2023 16:46:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4750983#M1096546</guid>
      <dc:creator>StevenEdmunds6666</dc:creator>
      <dc:date>2023-01-08T16:46:34Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4751053#M1096550</link>
      <description>&lt;P&gt;Follow below video&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=bSGjeJotO2s" target="_blank"&gt;https://www.youtube.com/watch?v=bSGjeJotO2s&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Still having issues, post the config from ASA, and new debug logs.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Jan 2023 19:58:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4751053#M1096550</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-01-08T19:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4751089#M1096551</link>
      <description>&lt;P&gt;Thanks for the link BB.&lt;/P&gt;&lt;P&gt;I followed it and still seem to be hitting the same road block. I have attached the config and the debugs.&lt;BR /&gt;I did see that it could be related to the following but not 100% sure:&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvi23605" target="_blank"&gt;CSCvi23605 : Bug Search Tool (cisco.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Steven&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 00:44:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4751089#M1096551</guid>
      <dc:creator>StevenEdmunds6666</dc:creator>
      <dc:date>2023-01-09T00:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4751101#M1096552</link>
      <description>&lt;P&gt;You need a valid CA-signed certificate on the VPN headend. Also, your headend needs to trust the certificate being presented by the SAML iDP.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 03:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4751101#M1096552</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-01-09T03:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4751193#M1096554</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;Apologies for the lack of understanding. When you say a valid 'CA-signed Certificate', are you referring to an SSL certificate for the domain like 'vpn.domain.com'? Is this what I'm after:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/200339-Configure-ASA-SSL-Digital-Certificate-I.html" target="_blank"&gt;Configure ASA: SSL Digital Certificate Installation and Renewal - Cisco&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Steven&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 09:38:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4751193#M1096554</guid>
      <dc:creator>StevenEdmunds6666</dc:creator>
      <dc:date>2023-01-09T09:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4751311#M1096560</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/879365"&gt;@StevenEdmunds6666&lt;/a&gt; stepping back a bit, when an ASA requests authentication be handled by a SAML identity provider (iDP) it contacts the iDP server via SSL/TLS. in doing so, it needs to trust the iDP's certificate. That's one part of the puzzle.&lt;/P&gt;
&lt;P&gt;After the SAML iDP interacts with the user to authenticate them, it contacts the ASA to tell it the authentication is complete (or failed, as the case may be). In that piece, the ASA (acting as the "Service Provider" in SAML terms) is the server whose certificate must be trusted by the iDP. So the ASA (or FTD or router - whatever is acting as the VPN headend) needs to have a proper certificate signed by a well-known public Certificate Authority (CA) so that the communication from the iDP to the ASA is likewise trusted and secured.&lt;/P&gt;
&lt;P&gt;The document you linked is indeed one that provides instructions on how to acquire and install a certificate on your ASA.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 13:04:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4751311#M1096560</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-01-09T13:04:55Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4751612#M1096596</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;I tried to install the certificate via the GUI using the documentation under the heading 'CA Certificates' and giving the Trustpoint name. However, I get the attached error.&lt;BR /&gt;&lt;BR /&gt;I was however, still able to install it against the identity I had used to generate the CSR and against the outside interface under the SSL settings.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Can I continue even with the problem I ran into or by not addressing it, will I make it harder for myself?&lt;BR /&gt;I have also included the running config so you can see it.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;/P&gt;&lt;P&gt;Steven&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 09:13:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4751612#M1096596</guid>
      <dc:creator>StevenEdmunds6666</dc:creator>
      <dc:date>2023-01-10T09:13:48Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4751889#M1096610</link>
      <description>&lt;P&gt;I have also realised that I may also have an issue with my certificate or config. Even though the cert is applied on the ASA, when I try to connect using AnyConnect, I get the message that 'Certificate does not match the server name'&lt;/P&gt;&lt;P&gt;This can be ignored - was because I wasn't connecting via the correct name on the AnyConnect client.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 10:10:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4751889#M1096610</guid>
      <dc:creator>StevenEdmunds6666</dc:creator>
      <dc:date>2023-01-10T10:10:35Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4752113#M1096611</link>
      <description>&lt;P&gt;I read lately that Digicert's issuing template can cause that error you saw. It looks like your portal is OK.&lt;/P&gt;
&lt;P&gt;Is SAML still not working for you? I don't see the SAML config stanzas in the running-config that you shared.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 12:45:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4752113#M1096611</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-01-10T12:45:14Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4752167#M1096616</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;that config was pre-MFA when I was having an issue installing the CA cert.&lt;/P&gt;&lt;P&gt;I am indeed still running into the same issue. I have attached the latest config with the debugs.&lt;BR /&gt;I have tried everything from recreating the SAML cert on the 365 end and even resetting the config back to an earlier point in time and going through the whole config again.&lt;BR /&gt;&lt;BR /&gt;These are the errors I'm seeing from the debug webvpn saml 255:&lt;BR /&gt;[Lasso] func=xmlSecKeyDuplicate:file=keys.c:line=670:obj=unknown&lt;BR /&gt;Jan 10 11:20:51 [SAML] consume_assertion: The profile cannot verify a signature on the message&lt;BR /&gt;[saml] webvpn_login_primary_username: SAML assertion validation failed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 14:20:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4752167#M1096616</guid>
      <dc:creator>StevenEdmunds6666</dc:creator>
      <dc:date>2023-01-10T14:20:52Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4752213#M1096618</link>
      <description>&lt;P&gt;In my experience, the error "consume_assertion: The profile cannot verify a signature on the message" is almost always due to not having the iDP's certificate installed on the ASA as a trusted CA. I'd double check that and let us know.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 15:19:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4752213#M1096618</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-01-10T15:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4753253#M1096670</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;Thanks for your assistance on this one. Tuned out to be a combination of a few things but these are the steps used to resolve the issue.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;I made a mistake in the CA certificate when reissuing which meant it wasn't looking at 'vpn.companydomain.com'&lt;/LI&gt;&lt;LI&gt;I ended up removing the crypto ca trustpoint AzureAD-AC-SAML and adding the certificate back in from Microsoft again&lt;/LI&gt;&lt;LI&gt;I also had to re-run the command that sets the IDP and SP to MS and local Trustpoint after removing and having to reapply the certificate&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Wed, 11 Jan 2023 22:17:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/4753253#M1096670</guid>
      <dc:creator>StevenEdmunds6666</dc:creator>
      <dc:date>2023-01-11T22:17:02Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/5222555#M1117454</link>
      <description>&lt;P&gt;Hello Marvin,&lt;/P&gt;
&lt;P&gt;I am getting a similar error in the debug saml,&amp;nbsp;[SAML] consume_assertion: assertion is expired or not valid.&lt;/P&gt;
&lt;P&gt;I doublechecked the&amp;nbsp;&lt;SPAN&gt;Assertion Consumer Service URL and SP Entity ID, all seems okay.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Any insights? Thanks a lot.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Nov 2024 07:53:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/5222555#M1117454</guid>
      <dc:creator>engineer467</dc:creator>
      <dc:date>2024-11-11T07:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/5222649#M1117471</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/157474"&gt;@engineer467&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Assuming the SAML IDP is using a currently valid certificate (easy enough to check), I would then check the time and date in your firewall.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Nov 2024 12:07:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/5222649#M1117471</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-11-11T12:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/5222668#M1117477</link>
      <description>Hello Marvin,&lt;BR /&gt;&lt;BR /&gt;Thanks for responding. I checked all of them and they looked fine. Then I&lt;BR /&gt;came across this cisco bug id (&lt;BR /&gt;&lt;A href="https://quickview.cloudapps.cisco.com/quickview/bug/CSCvi23605" target="_blank"&gt;https://quickview.cloudapps.cisco.com/quickview/bug/CSCvi23605&lt;/A&gt;). So&lt;BR /&gt;deleting the SAML config and reconfiguring worked for me. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;Appreciate your quick response.&lt;BR /&gt;</description>
      <pubDate>Mon, 11 Nov 2024 12:55:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/5222668#M1117477</guid>
      <dc:creator>engineer467</dc:creator>
      <dc:date>2024-11-11T12:55:15Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect with SAML connection issue</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/5222672#M1117479</link>
      <description>&lt;P&gt;Ah yes, that bug is a pitfall. Newer versions of ASA and ASDM even warn you of if when changing your SAM configuration.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Nov 2024 13:26:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-with-saml-connection-issue/m-p/5222672#M1117479</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-11-11T13:26:16Z</dc:date>
    </item>
  </channel>
</rss>

