- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-29-2022 11:43 PM
Simple setup but going me crazy since yesterday.
Cisco ASA Firepower 1010 with Anyconnect integration to Azure SAML.
I have followed the Cisco and MIcrosoft documents and configured exactly as mentioned (for about 5 times literally till now).
While i'm trying to connect, i can see the Azure login prompt, Azure singing me in, then HTML page not found response coming.
This vpn.company.com page can’t be found
No webpage was found for the web address: https://vpn.compnay.com/+CSCOE+/SAML/SP/ACS?tgname=Azure-MFA
I've enabled debugs and couldn't find anything.
Mar 30 17:29:24 [SAML] get_lasso_signature_method:
Use SHA256 in SAML Request
Mar 30 17:29:24 [SAML] saml_add_config: SAML config added to list
SAML AUTH: SAML hash table cleanup periodic task
Public archive directives retrieved from cache for index 1.
Mar 30 17:29:37
[SAML] build_authnrequest:
https://login.microsoftonline.com/23e274fb-1240-4362-9b03-6b133e33c70e/saml2?SAMLRequest=fVLLTsMwEPyVyPfEsd0m1GorhT6kSoAQIA5ckJtuqCXHDl6nPL4eJwipHOA6O7M7M%2FYcVWs6WfXhaO%2FgtQcMyXtrLMpxsCC9t9Ip1CitagFlqOV9dX0leZbLzrvgamfImeR%2FhUIEH7SzJNmtF%2BSZbTe5K...
[SAML] saml_is_idp_internal: getting SAML config for tg Azure-MFA
SAML AUTH: SAML hash table cleanup periodic task
SAML AUTH: SAML hash table cleanup periodic task
SAML AUTH: SAML hash table cleanup periodic task
SAML AUTH: SAML hash table cleanup periodic task
SAML AUTH: SAML hash table cleanup periodic task
SAML AUTH: SAML hash table cleanup periodic task
SAML AUTH: SAML hash table cleanup periodic task
SAML AUTH: SAML hash table cleanup periodic task
SAML AUTH: SAML hash table cleanup periodic task
SAML AUTH: SAML hash table cleanup periodic task
SAML AUTH: SAML hash table cleanup periodic task
SAML AUTH: SAML hash table cleanup periodic task
SAML AUTH: SAML hash table cleanup periodic task
Solved! Go to Solution.
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-20-2022 07:25 AM
We had the same fault. Runnin 7.0.1 ftd.
Had to change url in app settings in azure.
Replace the capital letters as follows.
https://vpn.compnay.com/+CSCOE+/saml/sp/acs?tgname=Azure-MFA
This worked for us, neither TAC or our cisco partner where able to figure it out.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-30-2022 01:47 AM
Hi ,
there is possible you missed any steps.
Please follow below tutorial that will guide you to step by step SAMLconfig .
https://www.youtube.com/watch?v=ORC0_0wsbQk
Thanks,
Jitendra
Jitendra
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-30-2022 02:04 AM
Hi Jitendra,
I have followed literally each and every video on youtube on this.
but just now its came into light, that do we need anyconnect apex licenses for this to work? Any idea?
As per the documentation only Apex support SAML, we have AnyConnect VPN Peers.
Sampath
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-30-2022 02:27 AM - edited 03-30-2022 02:44 AM
I can see apex licenses added more capabilities to any connect VPN.
Below are the documents where SAML Authentication is also included.
Also you can take help from below documents if its help you.
https://www.optanix.com/practical-guide-deploying-saml-anyconnect/
Thanks,
Jitendra
Jitendra
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-20-2023 06:11 AM
also worked for me, changed SAML and SP to lowercase and worked.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-20-2022 07:25 AM
We had the same fault. Runnin 7.0.1 ftd.
Had to change url in app settings in azure.
Replace the capital letters as follows.
https://vpn.compnay.com/+CSCOE+/saml/sp/acs?tgname=Azure-MFA
This worked for us, neither TAC or our cisco partner where able to figure it out.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-20-2022 08:18 PM
That's true, same worked for me as well. in my URL we have SAML/SP/ACS in caps.
The URL is freaking case sensitive.. where in the world a URL is case sensitive only god knows.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-21-2022 01:21 AM - edited 10-04-2022 06:19 AM
@SPoodari the value of the tgname in https://vpn.company.com/+CSCOE+/SAML/SP/ACS?tgname=Azure-MFA is case sensitive. The tgname is the tunnel-group (or connection profile as referred to in ASDM) that is using SAML authentication. You should be able to verify it by point to the metadata page for the tunnel-group (as referenced in your AnyConnect enterprise app in Azure AD).
FYI the portion of a URL after the domain name (sometimes referred to as the URI) is and has always been case-sensitive.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-16-2022 02:51 AM
not only case sensitive, the syntax is already different. Microsoft says:
htetepes : / / YOUR_CISCO_ANYCONNECT_FQDN/+CSCOE+/SAML/SP/ACS
Thanks to the solution in this thread I finally made it... took 2 days to sort everything out...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-04-2022 05:40 AM
Having trouble with this myself. Are you all saying whats in the cisco AND MS doc is wrong? They both say
htps/<YOUR_CISCO_ANYCONNECT_FQDN>/+CSCOE+/saml/sp/acs?tgname=<Tunnel_Group_Name>
but its needs to all be caps?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-04-2022 06:22 AM
@sysad43 the section <YOUR_CISCO_ANYCONNECT_FQDN> is not case-sensitive. You replace your VPN address with that section (omitting the <> symbols). The remainder of the URI is case-sensitive, including the +CSCOE+ string and <Tunnel_Group_Name> section. For the last section, replace your tunnel-group name exactly as it appears in your running configuration, including any capitalization.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-04-2022 06:25 AM
Right, but above people seem to be saying that the SAML/SP/ACS part also needs to be caps. It isnt in the docs.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-06-2022 06:35 AM
Ive tried it both ways and still get same 404 error after MFA signin. One thing Im unsure of is, do I need to enable SSL access on the outside interface for this to work? We only have IKE2 enabled.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-06-2022 10:43 AM
@sysad43 Azure AD will be replying to the firewall via https to the SP (service Provider in SAML terminology) URL so, yes, SSL must be enabled.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-12-2022 05:35 AM
I figured as much. Im just subbing as the network admin while we try to find someone who wants the job, so Im learning as I go. I will try this as soon as I get the latest interim patch installed.
