cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1879
Views
6
Helpful
11
Replies

One SAML for 2 AnyConnect profiles

bzaglewski
Level 1
Level 1

Hi,

I have Firepower 1140 managed by FDM with RA-VPN. I configured SAML server with Azure AD. 

Everything is working but only in one profiles. When I try to add SAML server for second profile I get an error: 

The SAML Server is already in use in a connection profile

It's possible to add one SAML server for more than 1 connection profiles?

11 Replies 11

marce1000
VIP
VIP

 

            - FYI : https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz40586

 M.



-- ' 'Good body every evening' ' this sentence was once spotted on a logo at the entrance of a Weight Watchers Club !

In this case bug is resolved in version 7.3 -  I updated FTD to version 7.3 but still get an error.

bzaglewski_0-1675110763368.png

I have 2 SAML Servers with the same IDP URL. In Azure I have 2 Enterprise Aplication with different metadata.

When I try to add new SAML Server (different name) I get an error:

bzaglewski_2-1675110982106.png

 

 

bzaglewski_1-1675110876676.png

 

 

The two enterprise applications in Azure should have unique URLs. Trying to reuse a single URL will always result in the error you cited, no matter what version of FTD or management type (local with FDM or remote with FMC or cdFMC).

No, the IdP URL is my Azure AD tenant URL. The URLs are the same for each enterprise application. In the CSCvz40586 error, this problem was supposed to be solved. I've currently set up over 10+ profiles with the same LDAP server and all is working.

Marvin Rhoads
Hall of Fame
Hall of Fame

The configuration on the iDP side (Azure in your case) relies on the metadata from Firepower that is specific to a given tunnel-group (also know ans a profile). A new profile will have different metadata.

You can create a second app instance in Azure tied to the second profile. Then add it as a second SAML server.

Hey,
I have the same issue, we created another instance of cisco anyconnect in Azure but the links for Azure AD identifier is the same - because the tenant is the same
So the new instance doesn't help here

I created second app in Azure - only matadata from Firepower is different. Entity ID and login/logout URLs is the same.

I try add second SAML server in FDM - with different name but the same Entity ID  and login/logout URLs. 

I can save this and deploy, but if I trying to change authentication methods in second tunnel I have same error: 

The SAML Server https://sts.windows.com/xxxxxxxx/ is already in use in a connection profile

Milos_Jovanovic
VIP Alumni
VIP Alumni

Hi,

I don't have FDM-managed device next to me, so I can't verify that it is the same as via FMC or as on ASA.

In general, you don't need to create another SAML IDP on FMD (after all, it is indeed same, for multiple applications). On ASA/FTD side, there will be only one SAML IDP created, while on Azure side you'll have multiple applications (as each one will have unique assertion consumer service URL, where tunnel-group is different). On tunnel-group, you'll need to reference this same unique SAML IDP, which means that under multiple tunnel-groups you are using same IDP.

However, since Azure by default generates separate certificate for each application (and on ASA side, since it will be only one IDP, so you can have only one certificate attached), you'll need to generate certificate externally and to upload it under each Azure app that you'll use for this VPN.

Kind regards,

Milos

Hi,

So I deleted all SAML servers on FDM. I created one SAML server with custom certificate - this certificate I added to two enterprise apps in Azure. For one RA VPN profile it's working but, when I trying to add this same SAML server for primary identity source to second profile I got this. 

bzaglewski_0-1676317967195.png

I tried everything but still SAML is working for only one profile - no matter which one...

dbooth
Level 1
Level 1

I have a Secure Firewall running 7.3 managed with FDM and have found a workaround to get 2 VPN Profiles working with SAML to 2 Enterprise Applications in the same Azure AD tenant. When creating the second VPN Profile, create a second SAML Server Identity Source (I call it 'Dummy' at this stage) with junk Entity ID, Sign In, & Sign Out URLs (I use https://tbd). Set other settings as required (e.g. the same IdP certificate assigned to all Enterprise Applications needs to be selected as mentioned before). Using junk URLs allows FDM to create the second VPN Profile, double-check all the parameters in the VPN Profile are correct because amending them after the end of this process will encounter the bug again. Deploy this config. Now go back to the 'Dummy' SAML Server, give it a more meaningful name and edit the URLs, entering the correct values from Azure. You should be able to make this edit and deploy this without encountering the bug. You end up with 2 SAML Servers configured which are essentially identical other than the name (e.g. using same URLs & certificates) but FDM seems happy with this if you follow this process, and the VPNs work. You can make edits to the Group Policies OK with this configuration in place, but any attempts to Edit the VPN Profiles will encounter the bug, and you would have to revert to the Dummy stage and then repeat the process. This obviously is workable with 2 VPN Profiles but won't scale.

That's working so good! This is exactly what we need!

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: