<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE Authentication to Azure MFA - RADIUS PAP Only? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-authentication-to-azure-mfa-radius-pap-only/m-p/3461413#M510888</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We would like to use Azure MFA when authenticating Anyconnect users on ASA, while also doing Posture and DACL's based on AD membership.&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;Using this doc as reference:&amp;nbsp; &lt;/SPAN&gt;&lt;A href="https://community.cisco.com/docs/DOC-76856"&gt;Multi-Factor Authentication with ISE.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(1)&amp;nbsp; Evidently MFA supports MSCHAPv2, but we only support PAP for RADIUS token servers.&amp;nbsp; Can you verify if this is accurate?&amp;nbsp;&amp;nbsp; &lt;A href="https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-get-started-server-radius" title="https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-get-started-server-radius"&gt;https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-get-started-server-radius&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(2)&amp;nbsp; If true, is there any way to support MFA where we don't send full AD credentials to it?&amp;nbsp; Any other design where we don't have to rely on PAP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Apr 2018 23:08:44 GMT</pubDate>
    <dc:creator>David Mitchell</dc:creator>
    <dc:date>2018-04-10T23:08:44Z</dc:date>
    <item>
      <title>ISE Authentication to Azure MFA - RADIUS PAP Only?</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-to-azure-mfa-radius-pap-only/m-p/3461413#M510888</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We would like to use Azure MFA when authenticating Anyconnect users on ASA, while also doing Posture and DACL's based on AD membership.&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;Using this doc as reference:&amp;nbsp; &lt;/SPAN&gt;&lt;A href="https://community.cisco.com/docs/DOC-76856"&gt;Multi-Factor Authentication with ISE.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(1)&amp;nbsp; Evidently MFA supports MSCHAPv2, but we only support PAP for RADIUS token servers.&amp;nbsp; Can you verify if this is accurate?&amp;nbsp;&amp;nbsp; &lt;A href="https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-get-started-server-radius" title="https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-get-started-server-radius"&gt;https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-get-started-server-radius&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(2)&amp;nbsp; If true, is there any way to support MFA where we don't send full AD credentials to it?&amp;nbsp; Any other design where we don't have to rely on PAP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2018 23:08:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-to-azure-mfa-radius-pap-only/m-p/3461413#M510888</guid>
      <dc:creator>David Mitchell</dc:creator>
      <dc:date>2018-04-10T23:08:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authentication to Azure MFA - RADIUS PAP Only?</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-to-azure-mfa-radius-pap-only/m-p/3461414#M510889</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA supports multiple authentications so you could either using Azure as RADIUS server or SAMLv2 IdP directly with ASA as the first authentication and then authorize-only on ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISE protcol support is shown in Table 2 of &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_01110.html#concept_BD3A270FEC0C411DA10FB808C14B48D5" title="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_01110.html#concept_BD3A270FEC0C411DA10FB808C14B48D5"&gt;Cisco Identity Services Engine Administrator Guide, Release 2.4 - Manage Users and External Identity Sources [Cisco Ide…&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So ISE supports EAP-GTC and PAP with token ID sources.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Apr 2018 03:26:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-to-azure-mfa-radius-pap-only/m-p/3461414#M510889</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-04-11T03:26:34Z</dc:date>
    </item>
  </channel>
</rss>

