Skip to content

Commit 91bd338

Browse files
committed
Product Backlog Item 2520181: SaaS App Tutorial: Cisco AnyConnect Update
1 parent 32dac1c commit 91bd338

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/active-directory/saas-apps/cisco-anyconnect.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 04/12/2023
1313
ms.author: jeedes
1414
---
1515

@@ -72,14 +72,17 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7272

7373
![Edit Basic SAML Configuration](common/edit-urls.png)
7474

75-
1. On the **Set up single sign-on with SAML** page, enter the values for the following fields (note that the values are case-sensitive):
75+
1. On the **Set up single sign-on with SAML** page, enter the values for the following fields:
7676

7777
1. In the **Identifier** text box, type a URL using the following pattern:
7878
`https://<SUBDOMAIN>.YourCiscoServer.com/saml/sp/metadata/<Tunnel_Group_Name>`
7979

8080
1. In the **Reply URL** text box, type a URL using the following pattern:
8181
`https://<YOUR_CISCO_ANYCONNECT_FQDN>/+CSCOE+/saml/sp/acs?tgname=<Tunnel_Group_Name>`
8282

83+
> [!NOTE]
84+
> `<Tunnel_Group_Name>` is a case-sensitive and the value must not contain dots "." and slashes "/".
85+
8386
> [!NOTE]
8487
> For clarification about these values, contact Cisco TAC support. Update these values with the actual Identifier and Reply URL provided by Cisco TAC. Contact the [Cisco AnyConnect Client support team](https://www.cisco.com/c/en/us/support/index.html) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8588

0 commit comments

Comments
 (0)