1 Risposta
- Più recenti
- Maggior numero di voti
- Maggior numero di commenti
1
Hello.
Check Access Group Configuration in Azure: First, verify that your Azure Access Group is configured correctly. Ensure that the users who should have access to the VPN are added to this Access Group. Also, double-check the Access Group ID to make sure it's accurate.
SAML Token Issuance: Make sure that Azure is correctly issuing SAML tokens to your VPN endpoint. You can do this by checking the Azure SAML token configuration. Ensure that the SAML assertions contain the necessary information for authentication and authorization.
Best regards, Andrii
Contenuto pertinente
- AWS UFFICIALEAggiornata 9 mesi fa
- AWS UFFICIALEAggiornata 9 mesi fa
- Come faccio a configurare AD FS come provider di identità SAML con un pool di utenti Amazon Cognito?AWS UFFICIALEAggiornata 3 anni fa
- Come faccio a configurare Auth0 come provider di identità SAML con un pool di utenti Amazon Cognito?AWS UFFICIALEAggiornata 2 anni fa
I've figured it out. When authorizing ingress, you can select “Allow access to users in a specific access group.” AzureAD sends over the Access Group ID as the groups GUID. To get this go to Groups in AzureAD and you will see it listed next to the group name. Just copy the Object Id and add it to the VPN authorizing rule.