<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC RA VPN policies integration with Azure AD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-ra-vpn-policies-integration-with-azure-ad/m-p/5321654#M1122279</link>
    <description>&lt;P&gt;Please make new post&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Mon, 18 Aug 2025 14:34:04 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2025-08-18T14:34:04Z</dc:date>
    <item>
      <title>FMC RA VPN policies integration with Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ra-vpn-policies-integration-with-azure-ad/m-p/5291337#M1121035</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;I have an issue on FMC caused by migration from on-prem MS AD to Azure AD. The problem is with RA VPN access policies using user-based restrictions.&lt;/P&gt;
&lt;P&gt;Previously, users authenticated with their on-prem MS AD credentials and gained access to allowed resources based on their identity from the legacy AD Realm configured in the access policies.&lt;/P&gt;
&lt;P&gt;The situation after the AD migration is as follows:&lt;/P&gt;
&lt;P&gt;I have configured SAML authentication for RA VPN to authenticate users from the MS Azure domain. It works as expected, and users can connect using AnyConnect and providing their credentials via Microsoft.&lt;/P&gt;
&lt;P&gt;I have also successfully created an MS Azure Realm in FMC.&lt;/P&gt;
&lt;P&gt;I can list the users from Azure Realm and use them in RA VPN access policies, but it does not affect accessing/blocking the resources. It seems that FMC can't connect the user authenticated through SAML while establishing the VPN connection and the user from Azure Realm specified in the access policy, although it is the same user.&lt;/P&gt;
&lt;P&gt;Just to mention that implementing Cisco ISE is not an option.&lt;/P&gt;
&lt;P&gt;Any ideas are appreciated.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;BR /&gt;Filip&lt;/P&gt;</description>
      <pubDate>Fri, 16 May 2025 11:23:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ra-vpn-policies-integration-with-azure-ad/m-p/5291337#M1121035</guid>
      <dc:creator>FilipX</dc:creator>
      <dc:date>2025-05-16T11:23:09Z</dc:date>
    </item>
    <item>
      <title>Re: FMC RA VPN policies integration with Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ra-vpn-policies-integration-with-azure-ad/m-p/5291964#M1121052</link>
      <description>&lt;P&gt;MS AD != Azure AD. Also Azure AD is called Entra ID now.&lt;/P&gt;
&lt;P&gt;So what is the user's UPN? Does that match? What is being returned to the firewall from the SAML flow.&lt;/P&gt;
&lt;P&gt;ISE is not required here.&lt;/P&gt;</description>
      <pubDate>Mon, 19 May 2025 13:01:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ra-vpn-policies-integration-with-azure-ad/m-p/5291964#M1121052</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-05-19T13:01:47Z</dc:date>
    </item>
    <item>
      <title>Re: FMC RA VPN policies integration with Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ra-vpn-policies-integration-with-azure-ad/m-p/5292294#M1121087</link>
      <description>&lt;P&gt;Hi ahollifield,&lt;/P&gt;
&lt;P&gt;Thank you for your answer.&lt;BR /&gt;In the Remote Access VPN Overview Dashboard in FMC, under active sessions, users are listed with their username, not with the UPN.&lt;BR /&gt;Can you please clarify which user's UPN should match—that from SAML with the one from Azure (Entra) Realm?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;SPAN&gt;Filip&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2025 13:53:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ra-vpn-policies-integration-with-azure-ad/m-p/5292294#M1121087</guid>
      <dc:creator>FilipX</dc:creator>
      <dc:date>2025-05-20T13:53:34Z</dc:date>
    </item>
    <item>
      <title>Re: FMC RA VPN policies integration with Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ra-vpn-policies-integration-with-azure-ad/m-p/5292315#M1121091</link>
      <description>needs to match whatever is being looked up inside of Entra&lt;BR /&gt;</description>
      <pubDate>Tue, 20 May 2025 14:41:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ra-vpn-policies-integration-with-azure-ad/m-p/5292315#M1121091</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-05-20T14:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: FMC RA VPN policies integration with Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ra-vpn-policies-integration-with-azure-ad/m-p/5321632#M1122278</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1839625"&gt;@FilipX&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you solve the problem?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 14:08:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ra-vpn-policies-integration-with-azure-ad/m-p/5321632#M1122278</guid>
      <dc:creator>piotr.smietanka</dc:creator>
      <dc:date>2025-08-18T14:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: FMC RA VPN policies integration with Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ra-vpn-policies-integration-with-azure-ad/m-p/5321654#M1122279</link>
      <description>&lt;P&gt;Please make new post&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 14:34:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ra-vpn-policies-integration-with-azure-ad/m-p/5321654#M1122279</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-08-18T14:34:04Z</dc:date>
    </item>
    <item>
      <title>Re: FMC RA VPN policies integration with Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ra-vpn-policies-integration-with-azure-ad/m-p/5321990#M1122309</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;piotr.smietanka,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I opened a TAC case, and after a long analysis by the Cisco engineer, I was pointed to this answer:&lt;BR /&gt;"You can enforce an access policy on a SAML-authenticated user if you have an associated identity policy with an AD realm matching the SAML domain. However, it does not work for Azure AD SAML because it requires additional mapping from the tenant ID of the Azure AD to an associated realm ID on the threat defense device."&lt;/P&gt;
&lt;P&gt;It is from the following document:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/740/management-center-device-config-74/vpn-remote-access.html#reference_pdf_cx3_psb" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/740/management-center-device-config-74/vpn-remote-access.html#reference_pdf_cx3_psb&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I hope this issue will be addressed in some future software update.&lt;/P&gt;
&lt;P&gt;Filip&lt;/P&gt;</description>
      <pubDate>Tue, 19 Aug 2025 14:17:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ra-vpn-policies-integration-with-azure-ad/m-p/5321990#M1122309</guid>
      <dc:creator>FilipX</dc:creator>
      <dc:date>2025-08-19T14:17:37Z</dc:date>
    </item>
  </channel>
</rss>

