Based on the nature of SAML (Security Assertion Markup Language) authentication process, it might not be feasible to perform SAML authentication on the Cisco Firepower Threat Defense (FTD) firewall. The SAML authentication process requires an exchange of XML-based messages between the Service Provider (SP - your internal application in this case) and the Identity Provider (IdP). Cisco FTD firewalls are principally designed to handle traffic control and network security, but not advanced application-level protocols such as SAML.
However, an alternative approach can be considered. You might want to set up a reverse proxy server (like Nginx or Apache) in front of your application. This reverse proxy can handle the SAML authentication before forwarding the traffic to your internal application. The flow would then look like this:
Flow ---) .com URL---)1.1.1.1--) Hits Reverse Proxy --) SAML(OK) --) Forward to Firewall --) Destination NAT happens to APPLICATION
Please note, this is a broad solution and actual implementation might vary depending on your specific network layout and requirements. Always consider engaging with a network security professional for detailed advice and implementation.
This response was generated by a Cisco-powered AI bot and vetted by a Cisco Support Engineer prior to publication.
This is part of a monitored experiment to see if the bot can help answer questions alongside community members. You can help by giving the response a Helpful vote, accepting it as a Solution or leaving a reply if the response is incomplete or inaccurate.