<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Two factor authentication for Palo alto VPN users using ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/two-factor-authentication-for-palo-alto-vpn-users-using-ise/m-p/5039499#M588082</link>
    <description>&lt;P&gt;That is a specific guest portal authentication mechanism which is not at all applicable in this case.&lt;/P&gt;&lt;P&gt;What you are after will require a 2FA mechanism and ISE is not the right product for that purpose. It can best work in conjunction to mfa solution like Duo.&lt;/P&gt;</description>
    <pubDate>Thu, 14 Mar 2024 11:40:55 GMT</pubDate>
    <dc:creator>Pulkit Mittal</dc:creator>
    <dc:date>2024-03-14T11:40:55Z</dc:date>
    <item>
      <title>Two factor authentication for Palo alto VPN users using ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/two-factor-authentication-for-palo-alto-vpn-users-using-ise/m-p/4654655#M576283</link>
      <description>&lt;P&gt;Can i get any reference documents or link to implement&amp;nbsp;Two factor authentication for Palo alto VPN users using ISE ?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2022 11:06:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/two-factor-authentication-for-palo-alto-vpn-users-using-ise/m-p/4654655#M576283</guid>
      <dc:creator>sming.ib.96</dc:creator>
      <dc:date>2022-07-21T11:06:05Z</dc:date>
    </item>
    <item>
      <title>Re: Two factor authentication for Palo alto VPN users using ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/two-factor-authentication-for-palo-alto-vpn-users-using-ise/m-p/4655016#M576290</link>
      <description>&lt;P&gt;This is a Cisco forum, I don't think you'll find much help here for configuring the Palo Alto side.&amp;nbsp; ISE isn't an MFA provider.&amp;nbsp; Have a look at DUO:&amp;nbsp;&lt;A href="https://duo.com/" target="_blank"&gt;https://duo.com/&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are plenty of integrations you can do between ISE and DUO.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2022 17:31:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/two-factor-authentication-for-palo-alto-vpn-users-using-ise/m-p/4655016#M576290</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-07-21T17:31:08Z</dc:date>
    </item>
    <item>
      <title>Re: Two factor authentication for Palo alto VPN users using ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/two-factor-authentication-for-palo-alto-vpn-users-using-ise/m-p/5039017#M588067</link>
      <description>&lt;P&gt;Did you ever find a solution for this? I also was questioning if I can leverage ISE to use as a MFA solution for our Palo GlobalProtect login&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2024 20:51:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/two-factor-authentication-for-palo-alto-vpn-users-using-ise/m-p/5039017#M588067</guid>
      <dc:creator>wilkins_95</dc:creator>
      <dc:date>2024-03-13T20:51:35Z</dc:date>
    </item>
    <item>
      <title>Re: Two factor authentication for Palo alto VPN users using ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/two-factor-authentication-for-palo-alto-vpn-users-using-ise/m-p/5039178#M588072</link>
      <description>&lt;P&gt;You can use Cisco ISE as Radius to authenticate users in Palo firewalls.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.packetswitch.co.uk/configuring-palo-alto-administrator-authentication-with-cisco-ise/" target="_blank"&gt;Configuring Palo Alto Administrator Authentication with Cisco ISE (packetswitch.co.uk)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Basically, then you can leverage ISE authentication rules to have Duo as an external radius server for mfa.&lt;/P&gt;&lt;P&gt;&lt;A href="https://duo.com/docs/ciscoise-radius#configure-your-cisco-ise" target="_blank"&gt;Duo Two-Factor RADIUS Authentication for Cisco ISE | Duo Security&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Pulkit&lt;/P&gt;&lt;P&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;EM&gt;&lt;STRONG&gt;If you find this useful, please mark it helpful and accept the solution.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 04:21:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/two-factor-authentication-for-palo-alto-vpn-users-using-ise/m-p/5039178#M588072</guid>
      <dc:creator>Pulkit Mittal</dc:creator>
      <dc:date>2024-03-14T04:21:50Z</dc:date>
    </item>
    <item>
      <title>Two factor authentication for Palo alto VPN users using ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/two-factor-authentication-for-palo-alto-vpn-users-using-ise/m-p/5039490#M588081</link>
      <description>Hello Pulkit&lt;BR /&gt;&lt;BR /&gt;I'm specially talking about GlobalProtect (client-less vpn). I'll explain, we allow users access to inside resources from outside our building via GlobalProtect. So let's say I'm home, I browse to [ &lt;A href="https://example.globalprotect.com,/" target="_blank"&gt;https://example.globalprotect.com,/&lt;/A&gt; | &lt;A href="https://example.globalprotect.com" target="_blank"&gt;https://example.globalprotect.com&lt;/A&gt;, ] I hit the GlobalProtect login screen. We leverage logins with our LDAP server, so I enter my LDAP credentials and I'm in. That's the current footprint. What I want to do now is add MFA, same process but I want the user to now also be prompted for a verification code, that would be sent to his/her e-mail. I'm looking for the most simplistic way to accomplish this and had loosely read via other blogs that that Cisco ISE (which we also have) may be able to provide this via it's RADIUS feature. Is this true?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 14 Mar 2024 11:30:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/two-factor-authentication-for-palo-alto-vpn-users-using-ise/m-p/5039490#M588081</guid>
      <dc:creator>wilkins_95</dc:creator>
      <dc:date>2024-03-14T11:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: Two factor authentication for Palo alto VPN users using ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/two-factor-authentication-for-palo-alto-vpn-users-using-ise/m-p/5039499#M588082</link>
      <description>&lt;P&gt;That is a specific guest portal authentication mechanism which is not at all applicable in this case.&lt;/P&gt;&lt;P&gt;What you are after will require a 2FA mechanism and ISE is not the right product for that purpose. It can best work in conjunction to mfa solution like Duo.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 11:40:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/two-factor-authentication-for-palo-alto-vpn-users-using-ise/m-p/5039499#M588082</guid>
      <dc:creator>Pulkit Mittal</dc:creator>
      <dc:date>2024-03-14T11:40:55Z</dc:date>
    </item>
    <item>
      <title>Re: Two factor authentication for Palo alto VPN users using ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/two-factor-authentication-for-palo-alto-vpn-users-using-ise/m-p/5039501#M588083</link>
      <description>&lt;P&gt;Like I mentioned, similar to this use case.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/cisco-anyconnect-two-factor-authentication-with-cisco-ise-ad-one/td-p/3325240" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/cisco-anyconnect-two-factor-authentication-with-cisco-ise-ad-one/td-p/3325240&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 11:42:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/two-factor-authentication-for-palo-alto-vpn-users-using-ise/m-p/5039501#M588083</guid>
      <dc:creator>Pulkit Mittal</dc:creator>
      <dc:date>2024-03-14T11:42:13Z</dc:date>
    </item>
  </channel>
</rss>

