Hi,
I haven't tried this scenario, but I don't see any issues with it, as long as you follow some common sense rules like:
- both ASA's use the same 'valid' certificate (valid = signed by a public/known CA or a private/trusted PKI - for the same DNS FQDN pointing to both ASA IPs);
- same tunnel-group/group-policy definition/settings (like group-alias, url-alias, authentication settings; all except IP pools)
Of course, you will not have any transparent failover so to speak.
If you have a reasonable L2 link between locations I think you can even use ASA VPN load-balancing (one virtual IP on the outside/vpn interface - same L2 segment - and different inside L3 interconnect subnets).
BR,
Octavian