08-01-2021 09:54 PM
Hi Everyone,
I have customer who has an ASA in Active/Standby mode and have SAML Single-Sign-On configured. The SAML SSO works fine but during failover, it gave and error "Authentication failed due to problem retrieving the single sign-on cookie. I did further research and the issue seems to be related to Bug CSCvi23605- Re-enable SAML to make config changes take effect. We had to reload the standby for it to work.
Just wondering if there is a permanent fix for this and when it is expected to be release.
thanks!
Solved! Go to Solution.
08-02-2021 11:25 AM
09-22-2021 12:53 PM
3 minutes would indeed matter. SAML assertions are only valid from the time issued until 30 seconds after issuance. If the standby ASA clock is off by 3 minutes (either plus or minus) it won't see the assertion as valid.
If it is indeed ntp-synchronized then the clock should be accurate within subsecond accuracy.
08-02-2021 11:25 AM
The BugID inidicates it's fixed in ASA 9.16(1).
08-24-2021 06:27 PM
Hi Marvin,
Unfortunately, the bug is still not resolved. Upgraded to 9.16(1) and did a failover test and tried to sign on to Azure SSO while the standby ASA (Firepower 2130 running in ASA mode only) was acting as primary, I get "Potential CSR attack detected", see attached.
Do you know what might be causing this?
We have an failover license but the new model I believe only requires one license on the primary as it is a shared licensing (i.e., a secondary license is not required on the standby).
Also, is there anything required for licensing to be activated on the standby ASA? Show license status shows Smart Licensing is enabled.
Thank you!
LN
08-25-2021 10:55 AM
Licensing should not cause an issue here.
While trying the AnyConnect client logon, run "debug webvpn saml 255" and capture the output. That should show some more useful details about what's failing.
08-25-2021 11:50 AM
Ok thanks Marvin. Is there a way for me to test this while it is running in Standby mode? I am trying to avoid another maintenance mode if possible.
08-28-2021 07:15 AM
You can't login to VPN on the unit while it is in Standby unit. Only the Active unit can handle that task.
09-17-2021 08:21 PM
Hi Marvin,
I was able to capture the "debug webvpn saml 255" while the standby ASA is active.
Below is what I see during the Anyconnect attempts:
%ASA-3-716162: Failed to consume SAML assertion. reason: assertion is expired or not valid.
SAML] consume_assertion:
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.....
[SAML] consume_assertion: assertion is expired or not valid
[SAML] consume_assertion
I found this URL here that mentions about time not synced:
[SAML] consume_assertion: assertion is expired or not valid
Problem 1. ASA time not synced with IdP’s time.
Solution 1. Configure ASA with the same NTP server used by IdP.
Problem 2. The assertion is not valid between the specified time.
Solution 2. Modify the timeout value configured on the ASA.
Not sure about this since it works on the primary ASA and the second ASA has the same configuration as the primary so why would this happen only on the secondary ASA (didn't check the time during the maintenance window and I am analyzing the debug now and just found this solution recommendation).
Thanks!
09-20-2021 09:03 PM
Hey Marvin,
Just wondering if you have any suggestions to the debug captured on the standby ASA.
Thank you in advance.
LN
09-22-2021 05:48 AM
You should be able to verify the time (clock and ntp status) on the secondary unit even while it's in standby role. Even if you cannot log into it directly, you can run the commands from the active unit:
failover exec standby show clock failover exec standby show ntp assoc
09-22-2021 11:51 AM
09-22-2021 12:53 PM
3 minutes would indeed matter. SAML assertions are only valid from the time issued until 30 seconds after issuance. If the standby ASA clock is off by 3 minutes (either plus or minus) it won't see the assertion as valid.
If it is indeed ntp-synchronized then the clock should be accurate within subsecond accuracy.
08-02-2021 12:11 PM
Thank you Marvin for the response! I appreciate it!
10-20-2021 12:40 AM
Thanks Marvin for your help. It was a time issue that was off that caused the standby ASA to not work for the SAML SSO for the VPN cleints.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide