09-10-2025 06:42 AM
We’re using Azure SAML authentication with Cisco Secure Client, and are planning to enable Always-On VPN. Since the VPN client must reach Azure SAML endpoints to complete Single Sign-On, we need to add the relevant URLs to the Always-On allow host list.
So far, I’ve added login.microsoftonline.com and login.microsoft.com, but authentication is still failing. Has anyone successfully configured this? If so, could you please share the complete list of allow hosts you’re using? Thanks
09-10-2025 07:26 AM
i have allowed below URL and works :
*.microsoftonline.com
*.windows.net
*.msappproxy.net
you can find more information :
https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/migrate-adfs-saml-based-sso
09-10-2025 04:01 PM - edited 09-10-2025 04:01 PM
Thanks Balaji, i have add these domains but still get "failed to connect to single sso url"
below is the script for the VPN connect always on, is there anything missing?
09-11-2025 11:38 PM
high level looks ok, but are you trying directly client and SAML you have any ISE in between ?
troubleshooting and check some guide lines :
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide