<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to implement Cisco ISE as Microsoft NPS to carry out Azure AD in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/how-to-implement-cisco-ise-as-microsoft-nps-to-carry-out-azure/m-p/4815415#M581180</link>
    <description>&lt;P&gt;ISE cannot simply take the place of NPS in this flow as it does not have a function to integrate with Azure AD MFA like the NPS extension.&lt;/P&gt;
&lt;P&gt;Depending on what Use Case you are working with (VPN, Wired, Wireless, Device Admin, etc), you could configure ISE to use your existing NPS as a RADIUS Proxy. ISE would forward the RADIUS/TACACS+ requests to NPS to handle the Authentication + MFA, then ISE could perform the Authorization only piece based on the response from NPS.&lt;/P&gt;
&lt;P&gt;If you are looking at the VPN use case, you could also have a Cisco ASA/FTD VPN headend perform the authentication via SAML + Azure MFA part itself and use ISE for the Authorization only part of the flow.&lt;/P&gt;</description>
    <pubDate>Mon, 17 Apr 2023 05:40:07 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2023-04-17T05:40:07Z</dc:date>
    <item>
      <title>How to implement Cisco ISE as Microsoft NPS to carry out Azure AD MFA</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implement-cisco-ise-as-microsoft-nps-to-carry-out-azure/m-p/4815333#M581179</link>
      <description>&lt;P&gt;I would like to see if it's possible to integrate Cisco ISE with Azure AD Multi-Factor authentication. Now I'm using&amp;nbsp;Network Policy Server (NPS) to do&amp;nbsp;Azure AD Multi-Factor authentication. Here is the netflow and configuration for easy understanding.&lt;/P&gt;&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-nps-extension" target="_blank" rel="noopener"&gt;Use Azure AD Multi-Factor Authentication with NPS - Microsoft Entra | Microsoft Learn&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 03:52:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implement-cisco-ise-as-microsoft-nps-to-carry-out-azure/m-p/4815333#M581179</guid>
      <dc:creator>tonyang</dc:creator>
      <dc:date>2023-04-17T03:52:21Z</dc:date>
    </item>
    <item>
      <title>Re: How to implement Cisco ISE as Microsoft NPS to carry out Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implement-cisco-ise-as-microsoft-nps-to-carry-out-azure/m-p/4815415#M581180</link>
      <description>&lt;P&gt;ISE cannot simply take the place of NPS in this flow as it does not have a function to integrate with Azure AD MFA like the NPS extension.&lt;/P&gt;
&lt;P&gt;Depending on what Use Case you are working with (VPN, Wired, Wireless, Device Admin, etc), you could configure ISE to use your existing NPS as a RADIUS Proxy. ISE would forward the RADIUS/TACACS+ requests to NPS to handle the Authentication + MFA, then ISE could perform the Authorization only piece based on the response from NPS.&lt;/P&gt;
&lt;P&gt;If you are looking at the VPN use case, you could also have a Cisco ASA/FTD VPN headend perform the authentication via SAML + Azure MFA part itself and use ISE for the Authorization only part of the flow.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 05:40:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implement-cisco-ise-as-microsoft-nps-to-carry-out-azure/m-p/4815415#M581180</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-04-17T05:40:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to implement Cisco ISE as Microsoft NPS to carry out Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implement-cisco-ise-as-microsoft-nps-to-carry-out-azure/m-p/4815778#M581184</link>
      <description>&lt;P&gt;Thanks for your advice, Greg.&lt;/P&gt;&lt;P&gt;F5 VPN is my use case. Is it possible to share more details on how to&amp;nbsp;&lt;SPAN&gt;have a Cisco ASA/FTD VPN headend perform the authentication via SAML + Azure MFA part itself&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;and use ISE for the Authorization only part of the flow ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 08:51:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implement-cisco-ise-as-microsoft-nps-to-carry-out-azure/m-p/4815778#M581184</guid>
      <dc:creator>tonyang</dc:creator>
      <dc:date>2023-04-17T08:51:52Z</dc:date>
    </item>
    <item>
      <title>Re: How to implement Cisco ISE as Microsoft NPS to carry out Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implement-cisco-ise-as-microsoft-nps-to-carry-out-azure/m-p/4816324#M581224</link>
      <description>&lt;P&gt;I'm not aware of a single document that includes the entire flow, but you could use a combination of concepts from the following documents:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215935-configure-asa-anyconnect-vpn-with-micros.html" target="_blank" rel="noopener"&gt;Configure ASA AnyConnect VPN with Microsoft Azure MFA through SAML&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.packetswitch.co.uk/cisco-anyconnect-with-azure-ad/" target="_blank" rel="noopener"&gt;Integrate Azure MFA with Cisco AnyConnect VPN&lt;/A&gt;&amp;nbsp;(does not properly use&amp;nbsp;the tunnel-group 'authorize only' config)&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/td-p/3513185" target="_blank" rel="noopener"&gt;VPN certificate auth using ISE?&lt;/A&gt;&amp;nbsp;(discusses proper use of the tunnel-group 'authorize only' config)&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 22:51:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implement-cisco-ise-as-microsoft-nps-to-carry-out-azure/m-p/4816324#M581224</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-04-17T22:51:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to implement Cisco ISE as Microsoft NPS to carry out Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implement-cisco-ise-as-microsoft-nps-to-carry-out-azure/m-p/4817313#M581272</link>
      <description>&lt;P&gt;Do you mean I need to add&amp;nbsp;Cisco AnyConnect into Cisco ISE as external radius servers ? The flow is from F5 VPN - Cisco ISE PSN -&amp;nbsp;Cisco AnyConnect - Azure AD, isn't it ?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2023 03:18:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implement-cisco-ise-as-microsoft-nps-to-carry-out-azure/m-p/4817313#M581272</guid>
      <dc:creator>tonyang</dc:creator>
      <dc:date>2023-04-19T03:18:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to implement Cisco ISE as Microsoft NPS to carry out Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implement-cisco-ise-as-microsoft-nps-to-carry-out-azure/m-p/5192883#M591765</link>
      <description>&lt;P&gt;Greg, Is there any document which can help to use for Device Admin which configure ISE to use existing NPS as a RADIUS Proxy. ISE would forward the RADIUS/TACACS+ requests to NPS to handle the Authentication + MFA, then ISE could perform the Authorization only piece based on the response from NPS&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2024 21:28:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implement-cisco-ise-as-microsoft-nps-to-carry-out-azure/m-p/5192883#M591765</guid>
      <dc:creator>samir-rana</dc:creator>
      <dc:date>2024-09-10T21:28:31Z</dc:date>
    </item>
    <item>
      <title>Re: How to implement Cisco ISE as Microsoft NPS to carry out Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-implement-cisco-ise-as-microsoft-nps-to-carry-out-azure/m-p/5192905#M591767</link>
      <description>&lt;P&gt;From the ISE perspective, the RADIUS Token piece would be similar to this example using Duo.&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/how-to-deploy-ise-device-admin-with-duo-mfa/ta-p/3821231" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/how-to-deploy-ise-device-admin-with-duo-mfa/ta-p/3821231&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2024 22:56:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-implement-cisco-ise-as-microsoft-nps-to-carry-out-azure/m-p/5192905#M591767</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-09-10T22:56:03Z</dc:date>
    </item>
  </channel>
</rss>

