You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/cisco-anyconnect.md
+60-6Lines changed: 60 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,6 +63,7 @@ To configure and test Azure AD SSO with Cisco AnyConnect, complete the following
63
63
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
64
64
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
65
65
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
66
+
1.**[VPN Configuration CLI](#vpn-configuration-CLI)** - VPN Configuration through CLI.
66
67
1.**[Configure Cisco AnyConnect SSO](#configure-cisco-anyconnect-sso)** - to configure the single sign-on settings on application side.
67
68
1.**[Create Cisco AnyConnect test user](#create-cisco-anyconnect-test-user)** - to have a counterpart of B.Simon in Cisco AnyConnect that is linked to the Azure AD representation of user.
68
69
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
@@ -80,17 +81,17 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
80
81
1. On the **Set up single sign-on with SAML** page, enter the values for the following fields:
81
82
82
83
a. In the **Identifier** text box, type a URL using the following pattern:
83
-
`your Cisco AnyConnect VPN Value`
84
+
`< YOUR CISCO ANYCONNECT VPN VALUE >`
84
85
85
86
b. In the **Reply URL** text box, type a URL using the following pattern:
86
-
`your Cisco AnyConnect VPN Value`
87
+
`< YOUR CISCO ANYCONNECT VPN VALUE >`
87
88
88
-
> [!NOTE]
89
+
> [!NOTE]
89
90
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [Cisco AnyConnect Client support team](https://www.cisco.com/c/en/us/support/index.html) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
90
91
91
-
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the metadata file and save it on your computer.
92
+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate file and save it on your computer.
1. On the **Set up Cisco AnyConnect** section, copy the appropriate URL(s) based on your requirement.
96
97
@@ -126,9 +127,62 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
126
127
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
127
128
1. In the **Add Assignment** dialog, click the **Assign** button.
128
129
130
+
## VPN Configuration CLI
131
+
132
+
1. You are going to do this on the CLI first, you might come back through and do an ASDM walk-through at another time.
133
+
134
+
1. Connect to your VPN Appliance, you are going to be using an ASA running 9.8 code train, and your VPN clients will be 4.6+.
135
+
136
+
1. First you will create a Trustpoint and import our SAML cert.
137
+
138
+
```
139
+
config t
140
+
141
+
crypto ca trustpoint AzureAD-AC-SAML
142
+
revocation-check none
143
+
no id-usage
144
+
enrollment terminal
145
+
no ca-check
146
+
crypto ca authenticate AzureAD-AC-SAML
147
+
-----BEGIN CERTIFICATE-----
148
+
…
149
+
PEM Certificate Text from download goes here
150
+
…
151
+
-----END CERTIFICATE-----
152
+
quit
153
+
```
154
+
155
+
1. The following commands will provision your SAML IdP.
156
+
157
+
```
158
+
webvpn
159
+
saml idp https://sts.windows.net/xxxxxxxxxxxxx/ (This is your Azure AD Identifier from the Set up Cisco AnyConnect section in the Azure portal)
160
+
url sign-in https://login.microsoftonline.com/xxxxxxxxxxxxxxxxxxxxxx/saml2 (This is your Login URL from the Set up Cisco AnyConnect section in the Azure portal)
161
+
url sign-out https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0 (This is Logout URL from the Set up Cisco AnyConnect section in the Azure portal)
162
+
trustpoint idp AzureAD-AC-SAML
163
+
trustpoint sp (Trustpoint for SAML Requests - you can use your existing external cert here)
164
+
no force re-authentication
165
+
no signature
166
+
base-url https://my.asa.com
167
+
```
168
+
169
+
1. Now you can apply SAML Authentication to a VPN Tunnel Configuration.
> There is a feature with the SAML IdP configuration - If you make changes to the IdP config you need to remove the saml identity-provider config from your Tunnel Group and re-apply it for the changes to become effective.
182
+
129
183
## Configure Cisco AnyConnect SSO
130
184
131
-
To configure single sign-on on **Cisco AnyConnect** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Cisco AnyConnect support team](https://www.cisco.com/c/en/us/support/index.html). They set this setting to have the SAML SSO connection set properly on both sides.
185
+
To configure single sign-on on **Cisco AnyConnect** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [Cisco AnyConnect support team](https://www.cisco.com/c/en/us/support/index.html). They set this setting to have the SAML SSO connection set properly on both sides.
0 commit comments