Hello Guys,
i'm currently trying to configure azure MFA on a firepower running version 7.0.4 to authenticate users connecting via vpn.
I'm using 5 dedicated connection profiles for each Business unit, i configured MFA on one group and worked correctly, but if i try to configure it on a second group instead i get the error: "authentication failed due to problem retrieving the single sign-on cookie", i'm usign the same single sign on option as per the first connection profile working.
On azure side, I added under the" basic saml configuration " the second connection profile but it doesn't work.
I searched the forum and some users address to this bug https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvi23605 while others report to put "request timeout " of the SSO server option to a blank/empty value but it doesn't seem to work.
is it necessary to open a case?
if it was a configuration problem i would have expected it shouldn't have worked on both connection profiles, instead, it works on one and on the other one it doesn't.
can you confirm that it is possible to enable mfa on multiple connection profiles?
the last aure screenshot is an example, i need to know if i need to add the string for every my connection profile.



thank you
regards