How to Set Up Azure AD VPN Integration with Cisco AnyConnect

May 6, 2024

If you’re already using Azure Active Directory (AD) for multi-factor authentication, integrating your VPN is the next smart move. More and more of our clients are shifting from on-prem authentication to Azure AD VPN integration with Cisco AnyConnect. For many good reasons. 

You get:

  • Granular control over who can log in remotely

  • Seamless sign-in with your users’ existing Azure AD credentials

  • Centralized management (no more collecting logs from on-prem servers)

  • Better visibility and simplified admin tasks

It’s a win for security, user experience, and IT time.

What You’ll Need to Get Started

Before you dive in, make sure you have the following:

  • An Azure AD subscription (free version available)

  • Cisco AnyConnect SSO enabled (available via the Azure Gallery)

  • Cisco ASA firmware version 9.7(1) or higher

    Note: If you’re running a load-balanced VPN, you’ll need ASA version 9.16 or newer.

Step 1: Add Cisco AnyConnect to Azure AD

Once you’re ready to go, the first step is to add The Cisco AnyConnect app to Azure AD form the Application Gallery. 

    1. Sign in to the Azure with your work or school account. 
    2. On the left navigation pane, go to Azure Active Directory > Enterprise Applications > All Applications
    3. Click New Application.
    4. Search for Cisco AnyConnect in the gallery. 
    5. Select it and wait while it installs to your tenant.

Step 2: Configure SAML-Based Single Sign-On

Now we have to configure and enable the AnyConnect Integration.

    1. In your new Cisco AnyConnect app, go to Single Sign-On. 
    2. Choose SAML as your sign-on method. 
    3. Click the pencil icon to edit Basic SAML Configuration.
set-up-single-sign-on-with-SAML

4. Enter your settings. Identifier (Entity ID) and Reply URL follow a specific format based on your tunnel group name. If you have multiple tunnel groups, you’ll need to create a separate app entry for each.

In the Identifier text box, type a URL using the following pattern:

Identifier-text-box-script

In the Reply URL text box, type a URL using the following pattern:

Reply-box-script

⚠️ Make sure your tunnel group name doesn’t contain dots or slashes, and note it’s case-sensitive.

5. Under SAML Signing Certificate, download the Base64 certificate

tunnel-group-app-creation-SAML

6. Copy the appropriate SAML URLs shown for your setup

Step 3: Assign Users or Groups to the VPN

Now we need to add either a test user or the group we want to enable for the VPN to the Cisco AnyConnect application.

    1. In the Azure portal, select Enterprise Applications > All applications > Cisco AnyConnect.
    2. In the app’s overview page, find the Manage section > Users and groups > Add User.
    3. In the Users and Groups dialog, select your test user or VPN group from the Users list.
    4. If you are expecting a role to be assigned to the users, you can select it from Select a Role. If no role has been set up for this app, you see “Default Access” role selected. Normally there is no additional role to assign.
    5. In the Add Assignment dialog, click the Assign

Step 4: Configure Cisco ASA for SAML Authentication

You’ll now need to configure your ASA device. The CLI is the fastest method, but you can also use ASDM (we’ll cover that in another post soon). 

Here’s the high level process:

1. Create a Trustpoint and import the SAML cert.

create-trustpoint-and-import-SAML-cert

2. Provision the SAML Identity Provider using the CLI

provision-your-SAML-IdP

3. Apply SAML authentication to your VPN tunnel group.

apply-SAML-authentication-to-VPN-tunnel-Configuration

4. Then apply it to your tunnel group and you’re set. When you log in to that tunnel group, you’ll be re-directed to an Azure sign in.

apply-SAML-authentication-to-VPN-tunnel-configuration
redirected-to-azure-sign-in

Need to update your IdP config later? You’ll have to remove and reapply the SAML setup for the changes to take effect.

Pro Tips for Denver SMBs

  • If you’re in construction or energy, centralizing VPN access control like this is a big help when managing mobile teams or offsite contractors.

  • In professional services or healthcare, it can also support compliance goals (think HIPAA or FINRA) by improving auditability and credential security.

Getting your Azure AD VPN integration right takes a bit of upfront work, but the payoff in streamlined access and improved security is worth it.

If you’re not ready to do it alone, we’re one click away.