11-01-2021 02:16 PM
Hi fellow users,
I'm running into an issue and I hope someone can help me in right direction.
I have configured Azure AD SSO and MFA together with Cisco AnyConnect VPN on FTD and it's working fine. I got two different internet connections for fallback if the primary line is down. How do I configure this kind of redundancy while integrating Cisco AnyConnect VPN with Azure AD SSO?
In Azure AD portal you add an enterprise application (Cisco AnyConnect in this case) and the an Azure AD Identifier is created and then we should enter base vpn url.
I have created two enterprise applications for Cisco AnyConnect with two different vpn base urls (one each for two different internet connections).
On Cisco FMC I created two SAML SSO servers and want to create two VPN profiles one each for two different internet connections. When I try to deploy I'm getting an error that Azure AD Identifiers are identical!
Can anyone help me how to solve this issue and maybe there is a better way to solve this issue.
Sincerely,
Sal