VPN Endpoint Authentication Issue with Azure SAML Provider

0

I've configured a VPN endpoint with Federated authentication using Azure as the SAML provider. However, I'm facing an issue with the Authorization rules. When I choose "Allow access to users in a specific access group" and specify the Access group ID, it doesn't work when accessing the VPN client. On the other hand, if I select "Allow access to all users," I can successfully access AWS resources. I would greatly appreciate your assistance with this matter.

1개 답변
1

Hello.

Check Access Group Configuration in Azure: First, verify that your Azure Access Group is configured correctly. Ensure that the users who should have access to the VPN are added to this Access Group. Also, double-check the Access Group ID to make sure it's accurate.

SAML Token Issuance: Make sure that Azure is correctly issuing SAML tokens to your VPN endpoint. You can do this by checking the Azure SAML token configuration. Ensure that the SAML assertions contain the necessary information for authentication and authorization.

Best regards, Andrii

profile picture
전문가
답변함 8달 전
profile picture
전문가
검토됨 16일 전
  • I've figured it out. When authorizing ingress, you can select “Allow access to users in a specific access group.” AzureAD sends over the Access Group ID as the groups GUID. To get this go to Groups in AzureAD and you will see it listed next to the group name. Just copy the Object Id and add it to the VPN authorizing rule.

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠