cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
405
Views
1
Helpful
3
Replies

Secure Client VPN Always-On – Allow Hosts for SAML Authentication

cheng.cathy
Level 1
Level 1

We’re using Azure SAML authentication with Cisco Secure Client, and are planning to enable Always-On VPN. Since the VPN client must reach Azure SAML endpoints to complete Single Sign-On, we need to add the relevant URLs to the Always-On allow host list.

So far, I’ve added login.microsoftonline.com and login.microsoft.com, but authentication is still failing. Has anyone successfully configured this? If so, could you please share the complete list of allow hosts you’re using?  Thanks

3 Replies 3

balaji.bandi
Hall of Fame
Hall of Fame

i have allowed below URL and works :

*.microsoftonline.com
*.windows.net
*.msappproxy.net

you can find more information :

https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/migrate-adfs-saml-based-sso

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

cheng.cathy
Level 1
Level 1

Thanks Balaji, i have add these domains but still get "failed to connect to single sso url"

below is the script for the VPN connect always on, is there anything missing? 

 

<AutomaticVPNPolicy>true
<TrustedDNSDomains>XXXXXXX</TrustedDNSDomains>
<TrustedNetworkPolicy>DoNothing</TrustedNetworkPolicy>
<UntrustedNetworkPolicy>Connect</UntrustedNetworkPolicy>
<BypassConnectUponSessionTimeout>false</BypassConnectUponSessionTimeout>
<AlwaysOn>true
<ConnectFailurePolicy>Closed
<AllowCaptivePortalRemediation>false
<CaptivePortalRemediationTimeout>5</CaptivePortalRemediationTimeout>
</AllowCaptivePortalRemediation>
<ApplyLastVPNLocalResourceRules>false</ApplyLastVPNLocalResourceRules>
</ConnectFailurePolicy>
<AllowVPNDisconnect>true</AllowVPNDisconnect>
<AllowedHosts>*.microsoftonline.com,*.windows.net,*.windows.net</AllowedHosts>
<SuppressConnectionRetries>false</SuppressConnectionRetries>
</AlwaysOn>
</AutomaticVPNPolicy>