cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
279
Views
0
Helpful
3
Replies

FMC RA VPN policies integration with Azure AD

FilipX
Level 1
Level 1

Hi all,

I have an issue on FMC caused by migration from on-prem MS AD to Azure AD. The problem is with RA VPN access policies using user-based restrictions.

Previously, users authenticated with their on-prem MS AD credentials and gained access to allowed resources based on their identity from the legacy AD Realm configured in the access policies.

The situation after the AD migration is as follows:

I have configured SAML authentication for RA VPN to authenticate users from the MS Azure domain. It works as expected, and users can connect using AnyConnect and providing their credentials via Microsoft.

I have also successfully created an MS Azure Realm in FMC.

I can list the users from Azure Realm and use them in RA VPN access policies, but it does not affect accessing/blocking the resources. It seems that FMC can't connect the user authenticated through SAML while establishing the VPN connection and the user from Azure Realm specified in the access policy, although it is the same user.

Just to mention that implementing Cisco ISE is not an option.

Any ideas are appreciated.

Thanks,
Filip

3 Replies 3

MS AD != Azure AD. Also Azure AD is called Entra ID now.

So what is the user's UPN? Does that match? What is being returned to the firewall from the SAML flow.

ISE is not required here.

Hi ahollifield,

Thank you for your answer.
In the Remote Access VPN Overview Dashboard in FMC, under active sessions, users are listed with their username, not with the UPN.
Can you please clarify which user's UPN should match—that from SAML with the one from Azure (Entra) Realm?

Thanks,
Filip

needs to match whatever is being looked up inside of Entra
Review Cisco Networking for a $25 gift card