<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE using Azure MFA and AD in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4180913#M563714</link>
    <description>&lt;A href="https://www.google.com/amp/s/packetswitch.co.uk/cisco-anyconnect-with-azure-ad/amp/" target="_blank"&gt;https://www.google.com/amp/s/packetswitch.co.uk/cisco-anyconnect-with-azure-ad/amp/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Here you go. I have the similar set up.&lt;BR /&gt;&lt;BR /&gt;Authentication on Azure AD&lt;BR /&gt;Authorization on ISE.&lt;BR /&gt;</description>
    <pubDate>Mon, 09 Nov 2020 14:44:21 GMT</pubDate>
    <dc:creator>vsurresh</dc:creator>
    <dc:date>2020-11-09T14:44:21Z</dc:date>
    <item>
      <title>ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/3592900#M536263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Are there any white papers on configuration VPN Authorization in ISE using Azure MFA and AD?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Feb 2017 19:34:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/3592900#M536263</guid>
      <dc:creator>imsheikh</dc:creator>
      <dc:date>2017-02-01T19:34:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/3592901#M536272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;if nothing for MFA how about whitepaper about using ISE for Anyconnect VPN authentication without MFA?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Feb 2017 20:14:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/3592901#M536272</guid>
      <dc:creator>imsheikh</dc:creator>
      <dc:date>2017-02-01T20:14:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/3592902#M536277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can find information on ISE and Anyconnect design guides.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/docs/DOC-64012"&gt;ISE Design &amp;amp;amp; Integration Guides&lt;/A&gt;&lt;/P&gt;&lt;P&gt;With related to MFA, ISE support RSA secure ID, Radius token. You can also use an external server such as Symatec VIP with guest portal. You can look at the integration with Symantec for that from the design guide above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Helvetica',sans-serif; color: #666666;"&gt;ISE is supporting Azure AD with MFA for SAML 2.0 SSO at ISE end-user-facing webauth portals if the primary auth is form-auth authentication.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, ASA supports MFA with two different identity sources for authentication, you can use ISE as authorization only in such cases.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Krishnan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2017 19:30:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/3592902#M536277</guid>
      <dc:creator>kthiruve</dc:creator>
      <dc:date>2017-02-02T19:30:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/3592903#M536280</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;SPAN class="font-color-meta" style="padding: 0 0 5px; font-size: 1.2em; font-family: arial; color: #8b8b8b;"&gt;&lt;SPAN class="replyToName" style="font-weight: inherit; font-style: inherit; font-size: 14.4px; font-family: inherit;"&gt;imsheikh,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="font-color-meta" style="padding: 0 0 5px; font-size: 1.2em; font-family: arial; color: #8b8b8b;"&gt;&lt;SPAN class="replyToName" style="font-weight: inherit; font-style: inherit; font-size: 14.4px; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="font-color-meta" style="padding: 0 0 5px; font-size: 1.2em; font-family: arial; color: #8b8b8b;"&gt;&lt;SPAN class="replyToName" style="font-weight: inherit; font-style: inherit; font-size: 14.4px; font-family: inherit;"&gt;I was working on the same thing it looks like you are trying to do.&amp;nbsp; We just set up an Azure MFA server to set up multi-factor for VPN and I also found that it works quite nice with accessing network devices.&amp;nbsp; Since the MFA server is on-prem and uses our AD I used the Azure server as an external radius token server in ISE.&amp;nbsp; The Azure server is now the Identity store I use in the Authentication Policy then, of course, AD groups for the Authorization policies.&amp;nbsp; I found the results to work just as we needed.&amp;nbsp; I did not have to set up the second authentication on the ASA.&amp;nbsp; Using the MFA as the Authentication Policy identity store now when we log into Cisco gear or the VPN we can use either a token or a push notification.&amp;nbsp; It is a little overkill for access to network gear but being a government organization we had a requirement for that.&amp;nbsp; it works much like the DUO Auth Proxy.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jan 2018 14:37:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/3592903#M536280</guid>
      <dc:creator>Richard Lucht</dc:creator>
      <dc:date>2018-01-12T14:37:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/3922829#M536282</link>
      <description>&lt;P&gt;Hi Richard,&lt;/P&gt;&lt;P&gt;Do you have the NPS w/ extension config that worked with ISE integration? I am attempting to setup ISE to NPS Azure MFA for device access like you have done by using RADIUS token server on ISE. I appreciate any assistance you can provide.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 20:19:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/3922829#M536282</guid>
      <dc:creator>MARK BAKER</dc:creator>
      <dc:date>2019-09-11T20:19:40Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/3922853#M536283</link>
      <description>&lt;P&gt;If you have your NPS server correctly working with Azure MFA, i.e. you can point VPN auth directly at NPS server and perform Azure MFA then you should be able to define the NPS server as an external RADIUS token server in ISE, ensure the ISE IPs are defined as RADIUS client on the NPS server and point VPN authentication to ISE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you tried this and it isn't working?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 20:41:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/3922853#M536283</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-09-11T20:41:02Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/3922855#M536284</link>
      <description>&lt;P&gt;Paul,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Doing device CLI login -&amp;gt; ISE -&amp;gt; NPS/AzureMFA as a first deployment. Would the NPS setup be the exact same as when used with ASA/VPN through NPS/MFA? If they are the same and can use the same policy, It may be a little easier to find documentation on the VPN setup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 20:46:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/3922855#M536284</guid>
      <dc:creator>MARK BAKER</dc:creator>
      <dc:date>2019-09-11T20:46:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/3922867#M536286</link>
      <description>It should be the same.  At the end of the day it is just RADIUS calls into NPS.  You can match on different RADIUS attributes in NPS if you want to build different policies.  If you are ultimately going to go against ISE I would recommend keeping your NPS policy as generic as possible.  Basically just have it run the MFA process.  All the AD group checking stuff can occur in ISE.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 11 Sep 2019 20:55:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/3922867#M536286</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-09-11T20:55:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4036471#M558400</link>
      <description>&lt;P&gt;Wanted to follow-up that I did get this working and wanted to add something that I was unable to find online. The examples I found online for device CLI MFA showed RADIUS configured on the device to ISE and then NPS /extension as RADIUS token server on ISE. You can use TACACS from device to ISE and RADIUS from ISE to NPS server. This is how I did it for device CLI MFA. It saved a lot of config changes on the Cisco devices.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 21:21:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4036471#M558400</guid>
      <dc:creator>MARK BAKER</dc:creator>
      <dc:date>2020-02-26T21:21:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4070687#M559802</link>
      <description>&lt;A href="https://packetswitch.co.uk/cisco-anyconnect-with-azure-ad/" target="_blank"&gt;https://packetswitch.co.uk/cisco-anyconnect-with-azure-ad/&lt;/A&gt;</description>
      <pubDate>Tue, 21 Apr 2020 16:01:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4070687#M559802</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2020-04-21T16:01:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4102260#M561162</link>
      <description>&lt;H3&gt;ISE&lt;/H3&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/192011"&gt;@paul&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;It should be the same. At the end of the day it is just RADIUS calls into NPS. You can match on different RADIUS attributes in NPS if you want to build different policies. If you are ultimately going to go against ISE I would recommend keeping your NPS policy as generic as possible. Basically just have it run the MFA process. All the AD group checking stuff can occur in ISE.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;H3&gt;&lt;BR /&gt;RADIUS Token Server Supported Authentication Protocols&lt;/H3&gt;&lt;P&gt;ISE Radius token with NPS solution only supported PAP protocol (ISE 2.4). Do you know if MSCHAPv2 protocol is now supported by ISE?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_01101.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_01101.html&lt;/A&gt;&lt;/P&gt;&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;</description>
      <pubDate>Fri, 12 Jun 2020 14:11:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4102260#M561162</guid>
      <dc:creator>chacy2000</dc:creator>
      <dc:date>2020-06-12T14:11:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4114228#M561544</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325841"&gt;@MARK BAKER&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do have a good guide you followed to setup ISE &amp;gt; NPS/AzureMFA? (aka Token Server)&lt;/P&gt;&lt;P&gt;I need to integrate AzureMFA with AnyConnect VPN but using a FirePower devices, not an ASA, so direct AuthZ to AzureMFA is not possible.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 21:22:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4114228#M561544</guid>
      <dc:creator>cfitzgerald</dc:creator>
      <dc:date>2020-07-06T21:22:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4114908#M561553</link>
      <description>New ZixCorp secure email message from Beacon Health Options&lt;BR /&gt;&lt;BR /&gt;To view the secure message, click on the link below or copy and paste the link into your Internet browser address bar.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://securemail-valueoptions.com/s/e?m=ABAaA5qVYKNGKd0VJGIvh5jp&amp;amp;c=ABCuAEoOylrg13RyZzJuX4Xf&amp;amp;em=ciscosupport%2eprod%7c914b1085%7cd159a44c%2dbfe0%2d4c39%2db348%2d3283c55c7cc2%40reply01%2elithium%2ecom" target="_blank"&gt;https://securemail-valueoptions.com/s/e?m=ABAaA5qVYKNGKd0VJGIvh5jp&amp;amp;c=ABCuAEoOylrg13RyZzJuX4Xf&amp;amp;em=ciscosupport%2eprod%7c914b1085%7cd159a44c%2dbfe0%2d4c39%2db348%2d3283c55c7cc2%40reply01%2elithium%2ecom&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;You are reading the plaintext version of this message. For a better user experience, change your email settings to enable the viewing of HTML.&lt;BR /&gt;&lt;BR /&gt;Do not reply to this notification message; this message was auto-generated by the sender's security system. To reply to the sender, click on the link above.&lt;BR /&gt;&lt;BR /&gt;The secure message expires on Jul 07, 2021 @ 10:11 PM (GMT).&lt;BR /&gt;&lt;BR /&gt;Want to send and receive secure email messages transparently? &lt;A href="http://www.zixcorp.com/info/zixmail_ZMC" target="_blank"&gt;http://www.zixcorp.com/info/zixmail_ZMC&lt;/A&gt;</description>
      <pubDate>Tue, 07 Jul 2020 22:11:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4114908#M561553</guid>
      <dc:creator>chacy2000</dc:creator>
      <dc:date>2020-07-07T22:11:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4114914#M561554</link>
      <description>The gateway type used shouldn’t matter-in my case ASA -only communicates (radius) with ISE . Below is my design diagram. Use NPS (ISE token server) for your Identity source (typically this is AD) for authentication policy. I used a similar setup guide as the attached. &lt;A href="https://community.cisco.com/kxiwq67737/attachments/kxiwq67737/4561-docs-security/5748/1/Multi-Factor%20Authentication%20with%20ISE.pdf" target="_blank"&gt;https://community.cisco.com/kxiwq67737/attachments/kxiwq67737/4561-docs-security/5748/1/Multi-Factor%20Authentication%20with%20ISE.pdf&lt;/A&gt; My design diagram image.png</description>
      <pubDate>Tue, 07 Jul 2020 22:22:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4114914#M561554</guid>
      <dc:creator>chacy2000</dc:creator>
      <dc:date>2020-07-07T22:22:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4180907#M563713</link>
      <description>&lt;P&gt;Is there any document that integrates Azure MFA on cloud 2020, with any-connect and all authorization from ISE, but&amp;nbsp;Without ON PREM azure server . Microsoft no longer allows ON prep Azure MFA server. Has to be without DUO.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 14:36:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4180907#M563713</guid>
      <dc:creator>Arjun Bhamra</dc:creator>
      <dc:date>2020-11-09T14:36:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4180913#M563714</link>
      <description>&lt;A href="https://www.google.com/amp/s/packetswitch.co.uk/cisco-anyconnect-with-azure-ad/amp/" target="_blank"&gt;https://www.google.com/amp/s/packetswitch.co.uk/cisco-anyconnect-with-azure-ad/amp/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Here you go. I have the similar set up.&lt;BR /&gt;&lt;BR /&gt;Authentication on Azure AD&lt;BR /&gt;Authorization on ISE.&lt;BR /&gt;</description>
      <pubDate>Mon, 09 Nov 2020 14:44:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4180913#M563714</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2020-11-09T14:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4180914#M563715</link>
      <description>&lt;P&gt;Here you go&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.google.com/amp/s/packetswitch.co.uk/cisco-anyconnect-with-azure-ad/amp/" target="_blank"&gt;https://www.google.com/amp/s/packetswitch.co.uk/cisco-anyconnect-with-azure-ad/amp/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 14:46:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4180914#M563715</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2020-11-09T14:46:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4492756#M570684</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/458722"&gt;@Baker&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Hey, do you have any documentation for how you implemented TACACS between network device and ISE &amp;amp; RADIUS between ISE and AZ MFA. Any help would be appreciated.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 14:46:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4492756#M570684</guid>
      <dc:creator>bhatel</dc:creator>
      <dc:date>2021-10-26T14:46:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE using Azure MFA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4492978#M570692</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1267410"&gt;@bhatel&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See if this helps. I don't recall where I got this online, but it was provided by Richard Lucht. You might be able to find the file location and possibly more info by searching "Azure MFA Richard Lucht". I just used TACACS instead of RADIUS between the router/firewall and ISE. I may have used this in combination with other online info.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 20:20:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-azure-mfa-and-ad/m-p/4492978#M570692</guid>
      <dc:creator>MARK BAKER</dc:creator>
      <dc:date>2021-10-26T20:20:51Z</dc:date>
    </item>
  </channel>
</rss>

