Hello,
For now vpn client are using basic authentication (AD login/password) and I want to enforce a new authentication method for vpn client (azure SAML),
The issue is every client usually open a secondary tunnel to our main site, it's totaly transparent for the user.
With SAML I will have a prompt when the second tunnel open, so I want to get ride of this functionnality, the traffic going though this secondary tunnel is legit but I want to use vpn routing instead.
To achieve this, should I disable secondary connect on all gateway with "$FWDIR/conf/trac_client_1.ttm" file ?
Or can I only modify Encryption domain for vpn client to include the destination subnet of the remote gateway ?
here is a picture of a part of my infra (default: default encryption domain, azure, vpn-client are specific encryption domain)
site 1 is the center gateway of a star community where site 2 and 3 are satellite
clients on site 2 and 3 usually open a secondary tunnel to site 1
If I add the subnet in red and blue in encryption domain, should it be enough ? I did some test and I still see a secondary tunnel, if I check routes on client I see subnets from all my gateway is it the issue ?

All Gateway version : R81.20 Take 99
Thanks for your help