<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 3.2 Azure AD and Secure Client RA VPN in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-and-secure-client-ra-vpn/m-p/4994275#M586253</link>
    <description>&lt;P&gt;We want to do Authentication via Azure AD SAML for our Remote Access VPN (FTD) via ISE.&lt;BR /&gt;The problem now is that ISE 3.1 doesn't seem to support Azure AD as External Source via SAML for other things than "Guest Portals".&lt;/P&gt;&lt;P&gt;What I was thinking the AAA setup should be:&lt;BR /&gt;- FTD RA VPN should use ISE and ISE should use Azure AD SAML for Authentication only.&lt;BR /&gt;- FTD RA VPN should use ISE and use other external sources needed for Authorization.&lt;/P&gt;&lt;P&gt;I can't seem to find if later versions of ISE (3.2/3.3) have full support for Azure AD as external sources.&lt;/P&gt;&lt;P&gt;The only workaround I can see is to directly configure Azure AD SAML on FTD for Authentication and use ISE only for Authorization.&lt;BR /&gt;For us there's a pretty big disadvantage doing this, using ISE as a single-point/junction for the AAA flows will not work.&lt;BR /&gt;So if we do it this way the AAA flow will be splitted and our log-handling and single-point for our Helpdesk to do enduser support via ISE will no longer be valid. But I can't see any other way to do it atm..?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 11 Jan 2024 11:37:57 GMT</pubDate>
    <dc:creator>J. H.</dc:creator>
    <dc:date>2024-01-11T11:37:57Z</dc:date>
    <item>
      <title>ISE 3.2 Azure AD and Secure Client RA VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-and-secure-client-ra-vpn/m-p/4892697#M583049</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I have been testing ISE 3.2 EAP-TLS integration with Azure AD as per the following guide which works well.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/218197-configure-ise-3-2-eap-tls-with-azure-act.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/218197-configure-ise-3-2-eap-tls-with-azure-act.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Is it supported to extend this use case for Secure Client RA VPN cert only authentication? Currently our Intune managed devices use certificate only authentication when connecting to RA VPN with authorisation-ony against ISE. ISE sees the users UPN in the CN field of the certificate, however I'm not sure if ISE could then perform a lookup of the UPN against AAD (same as EAP-TLS) to return groups for granular application of VPN group policy. Is this supported?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jul 2023 08:53:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-and-secure-client-ra-vpn/m-p/4892697#M583049</guid>
      <dc:creator>packet2020</dc:creator>
      <dc:date>2023-07-26T08:53:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 Azure AD and Secure Client RA VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-and-secure-client-ra-vpn/m-p/4893108#M583073</link>
      <description>&lt;P&gt;That's a great question.&amp;nbsp; If ISE knows the UPN, I don't see why the lookup wouldn't work.&amp;nbsp; Can you lab it up and let us know? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jul 2023 18:11:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-and-secure-client-ra-vpn/m-p/4893108#M583073</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-07-26T18:11:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 Azure AD and Secure Client RA VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-and-secure-client-ra-vpn/m-p/4893185#M583078</link>
      <description>&lt;P&gt;I tested a similar scenario in my lab earlier this year and found that the ROPC group match did work with ISE 3.2 when ISE was only performing the Authorization.&lt;/P&gt;
&lt;P&gt;The flow I tested was:&lt;/P&gt;
&lt;P&gt;ASA &amp;lt;-&amp;gt; Azure AD [SAML + Azure MFA] &amp;lt;-&amp;gt; ISE [AuthZ Only]&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jul 2023 22:20:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-and-secure-client-ra-vpn/m-p/4893185#M583078</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-07-26T22:20:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 Azure AD and Secure Client RA VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-and-secure-client-ra-vpn/m-p/4994275#M586253</link>
      <description>&lt;P&gt;We want to do Authentication via Azure AD SAML for our Remote Access VPN (FTD) via ISE.&lt;BR /&gt;The problem now is that ISE 3.1 doesn't seem to support Azure AD as External Source via SAML for other things than "Guest Portals".&lt;/P&gt;&lt;P&gt;What I was thinking the AAA setup should be:&lt;BR /&gt;- FTD RA VPN should use ISE and ISE should use Azure AD SAML for Authentication only.&lt;BR /&gt;- FTD RA VPN should use ISE and use other external sources needed for Authorization.&lt;/P&gt;&lt;P&gt;I can't seem to find if later versions of ISE (3.2/3.3) have full support for Azure AD as external sources.&lt;/P&gt;&lt;P&gt;The only workaround I can see is to directly configure Azure AD SAML on FTD for Authentication and use ISE only for Authorization.&lt;BR /&gt;For us there's a pretty big disadvantage doing this, using ISE as a single-point/junction for the AAA flows will not work.&lt;BR /&gt;So if we do it this way the AAA flow will be splitted and our log-handling and single-point for our Helpdesk to do enduser support via ISE will no longer be valid. But I can't see any other way to do it atm..?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 11:37:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-and-secure-client-ra-vpn/m-p/4994275#M586253</guid>
      <dc:creator>J. H.</dc:creator>
      <dc:date>2024-01-11T11:37:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 Azure AD and Secure Client RA VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-and-secure-client-ra-vpn/m-p/4994280#M586254</link>
      <description>The correct flow is to perform the SAML auth directly on the headend and use ISE as Authorize-only.&lt;BR /&gt;</description>
      <pubDate>Thu, 11 Jan 2024 11:53:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-and-secure-client-ra-vpn/m-p/4994280#M586254</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-01-11T11:53:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 Azure AD and Secure Client RA VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-and-secure-client-ra-vpn/m-p/5005429#M586718</link>
      <description>&lt;P&gt;I'm now using SAML and Azure AD. User gets MFA request, so far so good.&lt;BR /&gt;But it doesn't work. FTD/webvpn/SAML logs says this when user tries to connect:&lt;/P&gt;&lt;P&gt;[SAML] consume_assertion: The identifier of a provider is unknown to #LassoServer. To register a provider in a #LassoServer object, you must use the methods lasso_server_add_provider() or lasso_server_add_provider_from_buffer().&lt;BR /&gt;Jan 25 13:46:09&lt;BR /&gt;&lt;BR /&gt;[SAML] consume_assertion:&lt;/P&gt;&lt;P&gt;[saml] webvpn_login_primary_username: SAML assertion validation failed&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Anyconnect users get this message:&lt;BR /&gt;"Authentication failed due to problem retrieving the single sign-on cookie."&lt;/P&gt;&lt;P&gt;I've looked around but haven't found any solution. Seems to be a common problem with ASA though.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2024 13:06:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-and-secure-client-ra-vpn/m-p/5005429#M586718</guid>
      <dc:creator>J. H.</dc:creator>
      <dc:date>2024-01-25T13:06:04Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 Azure AD and Secure Client RA VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-and-secure-client-ra-vpn/m-p/5007482#M586813</link>
      <description>&lt;P&gt;This is the error commonly seen when there is a mismatch between the SAML IdP configuration on the ASA/FTD and the SAML IdP metadata on the IdP side (Entra ID, in this case). I would suggest comparing the metadata from the Entra ID Enterprise Application (especially the EntityID value) with the configuration on the FMC/FTD to verify they are the same.&lt;/P&gt;
&lt;P&gt;You might also compare your setup against this step-by-step guide -&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=G-e0drDu7fU" target="_blank" rel="noopener"&gt;Cisco VPN: FTD and Microsoft Azure AD with MFA using SAML&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you're still having issues, you will likely need to open a TAC case to investigate further.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jan 2024 22:16:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-and-secure-client-ra-vpn/m-p/5007482#M586813</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-01-28T22:16:10Z</dc:date>
    </item>
  </channel>
</rss>

