Skip to content

Commit 16fa73a

Browse files
committed
update
1 parent c5c7e3f commit 16fa73a

File tree

1 file changed

+60
-6
lines changed

1 file changed

+60
-6
lines changed

articles/active-directory/saas-apps/cisco-anyconnect.md

Lines changed: 60 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,7 @@ To configure and test Azure AD SSO with Cisco AnyConnect, complete the following
6363
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
6464
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
6565
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
66+
1. **[VPN Configuration CLI](#vpn-configuration-CLI)** - VPN Configuration through CLI.
6667
1. **[Configure Cisco AnyConnect SSO](#configure-cisco-anyconnect-sso)** - to configure the single sign-on settings on application side.
6768
1. **[Create Cisco AnyConnect test user](#create-cisco-anyconnect-test-user)** - to have a counterpart of B.Simon in Cisco AnyConnect that is linked to the Azure AD representation of user.
6869
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
@@ -80,17 +81,17 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8081
1. On the **Set up single sign-on with SAML** page, enter the values for the following fields:
8182

8283
a. In the **Identifier** text box, type a URL using the following pattern:
83-
`your Cisco AnyConnect VPN Value`
84+
`< YOUR CISCO ANYCONNECT VPN VALUE >`
8485

8586
b. In the **Reply URL** text box, type a URL using the following pattern:
86-
`your Cisco AnyConnect VPN Value`
87+
`< YOUR CISCO ANYCONNECT VPN VALUE >`
8788

88-
> [!NOTE]
89+
> [!NOTE]
8990
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [Cisco AnyConnect Client support team](https://www.cisco.com/c/en/us/support/index.html) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9091

91-
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the metadata file and save it on your computer.
92+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate file and save it on your computer.
9293

93-
![The Certificate download link](common/metadataxml.png)
94+
![The Certificate download link](common/certificatebase64.png)
9495

9596
1. On the **Set up Cisco AnyConnect** section, copy the appropriate URL(s) based on your requirement.
9697

@@ -126,9 +127,62 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
126127
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
127128
1. In the **Add Assignment** dialog, click the **Assign** button.
128129

130+
## VPN Configuration CLI
131+
132+
1. You are going to do this on the CLI first, you might come back through and do an ASDM walk-through at another time.
133+
134+
1. Connect to your VPN Appliance, you are going to be using an ASA running 9.8 code train, and your VPN clients will be 4.6+.
135+
136+
1. First you will create a Trustpoint and import our SAML cert.
137+
138+
```
139+
config t
140+
141+
crypto ca trustpoint AzureAD-AC-SAML
142+
revocation-check none
143+
no id-usage
144+
enrollment terminal
145+
no ca-check
146+
crypto ca authenticate AzureAD-AC-SAML
147+
-----BEGIN CERTIFICATE-----
148+
149+
PEM Certificate Text from download goes here
150+
151+
-----END CERTIFICATE-----
152+
quit
153+
```
154+
155+
1. The following commands will provision your SAML IdP.
156+
157+
```
158+
webvpn
159+
saml idp https://sts.windows.net/xxxxxxxxxxxxx/ (This is your Azure AD Identifier from the Set up Cisco AnyConnect section in the Azure portal)
160+
url sign-in https://login.microsoftonline.com/xxxxxxxxxxxxxxxxxxxxxx/saml2 (This is your Login URL from the Set up Cisco AnyConnect section in the Azure portal)
161+
url sign-out https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0 (This is Logout URL from the Set up Cisco AnyConnect section in the Azure portal)
162+
trustpoint idp AzureAD-AC-SAML
163+
trustpoint sp (Trustpoint for SAML Requests - you can use your existing external cert here)
164+
no force re-authentication
165+
no signature
166+
base-url https://my.asa.com
167+
```
168+
169+
1. Now you can apply SAML Authentication to a VPN Tunnel Configuration.
170+
171+
```
172+
tunnel-group AC-SAML webvpn-attributes
173+
saml identity-provider https://sts.windows.net/xxxxxxxxxxxxx/
174+
authentication saml
175+
end
176+
177+
write mem
178+
```
179+
180+
> [!NOTE]
181+
> There is a feature with the SAML IdP configuration - If you make changes to the IdP config you need to remove the saml identity-provider config from your Tunnel Group and re-apply it for the changes to become effective.
182+
129183
## Configure Cisco AnyConnect SSO
130184
131-
To configure single sign-on on **Cisco AnyConnect** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Cisco AnyConnect support team](https://www.cisco.com/c/en/us/support/index.html). They set this setting to have the SAML SSO connection set properly on both sides.
185+
To configure single sign-on on **Cisco AnyConnect** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [Cisco AnyConnect support team](https://www.cisco.com/c/en/us/support/index.html). They set this setting to have the SAML SSO connection set properly on both sides.
132186
133187
### Create Cisco AnyConnect test user
134188

0 commit comments

Comments
 (0)