<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Substituting Okta for RSA in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/substituting-okta-for-rsa/m-p/4897916#M583246</link>
    <description>&lt;P&gt;SAML IdP can only be used for specific portal-based flows in ISE. See the &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-2/admin_guide/b_ise_admin_3_2/b_ISE_admin_32_asset_visibility.html#concept_6878301F1F7C460585A4A267ECF77723" target="_blank" rel="noopener"&gt;Admin Guide&lt;/A&gt; for more info.&lt;/P&gt;
&lt;P&gt;If you need to use SAML for VPN + MFA, you would likely need to move to a different flow where the VPN headend (ASA/FTD) performs the Authentication directly against Okta using SAML and then hands off to ISE to perform Authorization only.&lt;/P&gt;
&lt;P&gt;VPN headend &amp;lt;-&amp;gt; Okta SAML authC -&amp;gt; ISE AuthZ only&lt;/P&gt;
&lt;P&gt;Example ASA + Okta SAML config:&lt;BR /&gt;&lt;A href="https://saml-doc.okta.com/SAML_Docs/How-to-Configure-SAML-2.0-for-Cisco-ASA-VPN.html" target="_blank"&gt;https://saml-doc.okta.com/SAML_Docs/How-to-Configure-SAML-2.0-for-Cisco-ASA-VPN.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Example ASA RADIUS server config for ISE Authorization only:&lt;/P&gt;
&lt;PRE&gt;aaa-server ISE_RAD protocol radius&lt;BR /&gt; authorize-only&lt;BR /&gt; interim-accounting-update&lt;BR /&gt; dynamic-authorization&lt;/PRE&gt;</description>
    <pubDate>Wed, 02 Aug 2023 23:20:39 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2023-08-02T23:20:39Z</dc:date>
    <item>
      <title>Substituting Okta for RSA</title>
      <link>https://community.cisco.com/t5/network-access-control/substituting-okta-for-rsa/m-p/4897766#M583238</link>
      <description>&lt;P&gt;We currently use ISE to process access requests from Global Protect users.&amp;nbsp; The remote GP VPN users are currently using RSA via RADIUS.&amp;nbsp; Works fine, so of course they want to change it up such that ISE forwards to Okta instead of RSA.&amp;nbsp; Both Okta and RSA already talk to our AD environment, so I think it's mostly a matter of creating a new External Identity Source in ISE, and updating the specific Policy Set to use this new source.&lt;/P&gt;&lt;P&gt;I've not configured ISE with SAML before, and was hoping to find somebody who has been down this road.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Aug 2023 17:05:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/substituting-okta-for-rsa/m-p/4897766#M583238</guid>
      <dc:creator>fitzie</dc:creator>
      <dc:date>2023-08-02T17:05:35Z</dc:date>
    </item>
    <item>
      <title>Re: Substituting Okta for RSA</title>
      <link>https://community.cisco.com/t5/network-access-control/substituting-okta-for-rsa/m-p/4897916#M583246</link>
      <description>&lt;P&gt;SAML IdP can only be used for specific portal-based flows in ISE. See the &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-2/admin_guide/b_ise_admin_3_2/b_ISE_admin_32_asset_visibility.html#concept_6878301F1F7C460585A4A267ECF77723" target="_blank" rel="noopener"&gt;Admin Guide&lt;/A&gt; for more info.&lt;/P&gt;
&lt;P&gt;If you need to use SAML for VPN + MFA, you would likely need to move to a different flow where the VPN headend (ASA/FTD) performs the Authentication directly against Okta using SAML and then hands off to ISE to perform Authorization only.&lt;/P&gt;
&lt;P&gt;VPN headend &amp;lt;-&amp;gt; Okta SAML authC -&amp;gt; ISE AuthZ only&lt;/P&gt;
&lt;P&gt;Example ASA + Okta SAML config:&lt;BR /&gt;&lt;A href="https://saml-doc.okta.com/SAML_Docs/How-to-Configure-SAML-2.0-for-Cisco-ASA-VPN.html" target="_blank"&gt;https://saml-doc.okta.com/SAML_Docs/How-to-Configure-SAML-2.0-for-Cisco-ASA-VPN.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Example ASA RADIUS server config for ISE Authorization only:&lt;/P&gt;
&lt;PRE&gt;aaa-server ISE_RAD protocol radius&lt;BR /&gt; authorize-only&lt;BR /&gt; interim-accounting-update&lt;BR /&gt; dynamic-authorization&lt;/PRE&gt;</description>
      <pubDate>Wed, 02 Aug 2023 23:20:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/substituting-okta-for-rsa/m-p/4897916#M583246</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-08-02T23:20:39Z</dc:date>
    </item>
  </channel>
</rss>

