<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Azure AD MFA for Anyconnect VPN clients with ISE 3.0 REST ID in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/azure-ad-mfa-for-anyconnect-vpn-clients-with-ise-3-0-rest-id/m-p/4434039#M568493</link>
    <description>&lt;DIV class="lia-message-subject lia-component-message-view-widget-subject"&gt;&lt;DIV class="MessageSubject"&gt;&lt;DIV class="lia-message-subject"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;&lt;DIV class="lia-message-body-content"&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Wondering if anyone is using ISE 3.0 REST ID with Azure AD ?&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216182-configure-ise-3-0-rest-id-with-azure-act.html" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216182-configure-ise-3-0-rest-id-with-azure-act.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;If yes, once you've added Azure AD as an External Identity Source in ISE 3.0, can you leverage on Azure AD MFA feature for Anyconnect VPN clients ?&lt;/P&gt;&lt;P&gt;I'm trying to setup MFA with Azure AD for Anyconnect VPN clients currently authenticating with ISE 3.0.&lt;/P&gt;&lt;P&gt;Any help will be greatly appreciated.Thanks.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Thu, 15 Jul 2021 20:21:01 GMT</pubDate>
    <dc:creator>Rao29</dc:creator>
    <dc:date>2021-07-15T20:21:01Z</dc:date>
    <item>
      <title>Azure AD MFA for Anyconnect VPN clients with ISE 3.0 REST ID</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-ad-mfa-for-anyconnect-vpn-clients-with-ise-3-0-rest-id/m-p/4434039#M568493</link>
      <description>&lt;DIV class="lia-message-subject lia-component-message-view-widget-subject"&gt;&lt;DIV class="MessageSubject"&gt;&lt;DIV class="lia-message-subject"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;&lt;DIV class="lia-message-body-content"&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Wondering if anyone is using ISE 3.0 REST ID with Azure AD ?&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216182-configure-ise-3-0-rest-id-with-azure-act.html" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216182-configure-ise-3-0-rest-id-with-azure-act.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;If yes, once you've added Azure AD as an External Identity Source in ISE 3.0, can you leverage on Azure AD MFA feature for Anyconnect VPN clients ?&lt;/P&gt;&lt;P&gt;I'm trying to setup MFA with Azure AD for Anyconnect VPN clients currently authenticating with ISE 3.0.&lt;/P&gt;&lt;P&gt;Any help will be greatly appreciated.Thanks.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 15 Jul 2021 20:21:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-ad-mfa-for-anyconnect-vpn-clients-with-ise-3-0-rest-id/m-p/4434039#M568493</guid>
      <dc:creator>Rao29</dc:creator>
      <dc:date>2021-07-15T20:21:01Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA for Anyconnect VPN clients with ISE 3.0 REST ID</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-ad-mfa-for-anyconnect-vpn-clients-with-ise-3-0-rest-id/m-p/4441523#M568775</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/813068"&gt;@Rao29&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you get a resolution to this?&amp;nbsp; It's a good question and I have not tried this myself - but keen to know other people's experiences.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 03:56:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-ad-mfa-for-anyconnect-vpn-clients-with-ise-3-0-rest-id/m-p/4441523#M568775</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-07-30T03:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA for Anyconnect VPN clients with ISE 3.0 REST ID</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-ad-mfa-for-anyconnect-vpn-clients-with-ise-3-0-rest-id/m-p/4443893#M568840</link>
      <description>&lt;P&gt;ISE 3.0 REST ID with Azure AD uses OAuth-ROPC for handling 802.1X authentications for switches or wireless, not VPN. The reason for this is because with 802.1X you do not have an IP address until you are authenticated and you cannot communicate with OAuth/SAML identity providers unless you have an IP address. This is a chicken and egg problem! See our ISE Webinar in YouTube​ on the topic: &lt;A href="https://youtu.be/92ncCo3_M84&amp;amp;t=508s" target="_self"&gt;&lt;STRONG&gt;802.1X with Azure AD using ROPC&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Typically if you want to do OAuth/SAML-based authentication for VPN clients you have the ASA or other VPN concentrator handle the authentication against the OAuth/SAML Identity Provider &lt;EM&gt;then&lt;/EM&gt; ISE handles the authorization.&lt;/P&gt;
&lt;P&gt;See &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215935-configure-asa-anyconnect-vpn-with-micros.html" target="_self"&gt;&lt;STRONG&gt;Configure ASA AnyConnect VPN with Microsoft Azure MFA through SAML&lt;/STRONG&gt;&lt;/A&gt; &lt;BR /&gt;and &lt;STRONG&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/217267-configure-asa-anyconnect-with-saml-and-c.html" target="_self"&gt;Configure ASA Anyconnect with SAML and Certificates&lt;/A&gt;&lt;/STRONG&gt; .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Aug 2021 18:29:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-ad-mfa-for-anyconnect-vpn-clients-with-ise-3-0-rest-id/m-p/4443893#M568840</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2021-08-04T18:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA for Anyconnect VPN clients with ISE 3.0 REST ID</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-ad-mfa-for-anyconnect-vpn-clients-with-ise-3-0-rest-id/m-p/5102901#M589393</link>
      <description>&lt;P&gt;Hello Thomas,&lt;/P&gt;&lt;P&gt;I have almost the same scenario, Authenticate using SAML and Authorize using ISE but the issue that we are facing with Authorization is how to match the users membership on AD groups. I'm using the External Identity match to provide the Authorize profile, but it not working (the Azure and ISE integration is working and I'm able to fetch all groups inside the AD)&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 May 2024 00:39:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-ad-mfa-for-anyconnect-vpn-clients-with-ise-3-0-rest-id/m-p/5102901#M589393</guid>
      <dc:creator>masees85</dc:creator>
      <dc:date>2024-05-12T00:39:54Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA for Anyconnect VPN clients with ISE 3.0 REST ID</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-ad-mfa-for-anyconnect-vpn-clients-with-ise-3-0-rest-id/m-p/5103203#M589397</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1305891"&gt;@masees85&lt;/a&gt;&amp;nbsp;, what version of ISE are you using? I believe this ability to perform Authorization against Entra ID (when ISE is not doing the Authentication) requires the feature enhancement in ISE 3.2, similar to the &lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635#toc-hId-524178477" target="_blank" rel="noopener"&gt;use case for 802.1x using EAP-TLS&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;I have this setup in my lab using ISE 3.2 patch 5 using the following flow with both an ASA and FTD and it works as expected.&lt;BR /&gt;ASA/FTD -&amp;gt; [SAML] Entra ID + MFA -&amp;gt; ISE AuthZ Only&lt;/P&gt;</description>
      <pubDate>Sun, 12 May 2024 22:24:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-ad-mfa-for-anyconnect-vpn-clients-with-ise-3-0-rest-id/m-p/5103203#M589397</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-05-12T22:24:15Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA for Anyconnect VPN clients with ISE 3.0 REST ID</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-ad-mfa-for-anyconnect-vpn-clients-with-ise-3-0-rest-id/m-p/5103209#M589398</link>
      <description>&lt;P&gt;Thanks for your reply Greg, my ISE version is&amp;nbsp;3.2.0.542, Okay the question is how does ISE check the user membership while the groups are on Azure AD, for instance, if user x is on the sales group how the ISE will recognize that?! does ISE check directly from ISE to Azure, or the FTD will send the Attributes that getting from Azure AD to FTD to ISE?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 May 2024 23:07:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-ad-mfa-for-anyconnect-vpn-clients-with-ise-3-0-rest-id/m-p/5103209#M589398</guid>
      <dc:creator>masees85</dc:creator>
      <dc:date>2024-05-12T23:07:02Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD MFA for Anyconnect VPN clients with ISE 3.0 REST ID</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-ad-mfa-for-anyconnect-vpn-clients-with-ise-3-0-rest-id/m-p/5103328#M589401</link>
      <description>&lt;P&gt;ISE queries Entra ID directly via the Graph API using the identity provided to ISE by VPN headend. It's important the the identity that ISE gets is the User Principal Name (UPN) as that is the only attribute ISE can use to perform the REST ID lookup against the Graph API.&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2024 06:29:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-ad-mfa-for-anyconnect-vpn-clients-with-ise-3-0-rest-id/m-p/5103328#M589401</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-05-13T06:29:37Z</dc:date>
    </item>
  </channel>
</rss>

