<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE 3.2 and MFA for Device admin in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-and-mfa-for-device-admin/m-p/5115633#M589613</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/514303"&gt;@ferdie.leroux1&lt;/a&gt;&amp;nbsp;can you share the deployment guide for NPS-EntraID connection? (not the deployment of the NPS Extension but the config piece on EntraID)&lt;/P&gt;
&lt;P&gt;I've everything on the ISE side configure as in the DUO example from&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/17232"&gt;@Marcelo Morais&lt;/a&gt;, and ISE is setup as "Remote RADIUS Server Group" on NPS, plus NPS has "Connections to Microsoft Routing and Remote Access server" policy enabled, but something is failing between NPS and EntraID.&lt;/P&gt;</description>
    <pubDate>Fri, 24 May 2024 13:42:12 GMT</pubDate>
    <dc:creator>JPavonM</dc:creator>
    <dc:date>2024-05-24T13:42:12Z</dc:date>
    <item>
      <title>Cisco ISE 3.2 and MFA for Device admin</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-and-mfa-for-device-admin/m-p/4821911#M581382</link>
      <description>&lt;P&gt;I'm trying to implement MFA for TACACS+ device administration. I integrated with NPS using a RADIUS token as an External Identity source and created an identity source sequence where the RADIUS token is 1st and the original AD authentication is 2nd.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I increased the TACACS timeout on the device and the RADIUS token so no timeout accurs.&lt;/P&gt;&lt;P&gt;The MFA gets to the mobile device and the MFA works as expected except it doesn't get to the authorization part of the policy.&lt;/P&gt;&lt;P&gt;From a log perspective everything looks fine except for:&lt;/P&gt;&lt;P&gt;24100 Some of the expected attributes are not found on the subject record. The default values, if configured, will be used for these attributes&lt;/P&gt;&lt;P&gt;How do I go about fixing this? I read somewhere that the attribute value might be empty. I also don't get any clear articles or guides on how to implement MFA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2023 07:05:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-and-mfa-for-device-admin/m-p/4821911#M581382</guid>
      <dc:creator>ferdie.leroux1</dc:creator>
      <dc:date>2023-04-26T07:05:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.2 and MFA for Device admin</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-and-mfa-for-device-admin/m-p/4824586#M581455</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/514303"&gt;@ferdie.leroux1&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;as a reference try the&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/duo-mfa-integration-with-ise-for-tacacs-device-administration/ta-p/3881767" target="_blank" rel="noopener"&gt;Duo MFA Integration with ISE for TACACS+ Device Administration with Microsoft Active Directory Users&lt;/A&gt;.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Sat, 29 Apr 2023 13:30:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-and-mfa-for-device-admin/m-p/4824586#M581455</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2023-04-29T13:30:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.2 and MFA for Device admin</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-and-mfa-for-device-admin/m-p/5066886#M588704</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/17232"&gt;@Marcelo Morais&lt;/a&gt;&amp;nbsp;when will it possible to use Azure AD as an identity source for device admin policy in ISE? wanting to leverage our existing Azure MFA for privileged users&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 05:52:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-and-mfa-for-device-admin/m-p/5066886#M588704</guid>
      <dc:creator>Jamie_Hessels</dc:creator>
      <dc:date>2024-04-12T05:52:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.2 and MFA for Device admin</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-and-mfa-for-device-admin/m-p/5115633#M589613</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/514303"&gt;@ferdie.leroux1&lt;/a&gt;&amp;nbsp;can you share the deployment guide for NPS-EntraID connection? (not the deployment of the NPS Extension but the config piece on EntraID)&lt;/P&gt;
&lt;P&gt;I've everything on the ISE side configure as in the DUO example from&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/17232"&gt;@Marcelo Morais&lt;/a&gt;, and ISE is setup as "Remote RADIUS Server Group" on NPS, plus NPS has "Connections to Microsoft Routing and Remote Access server" policy enabled, but something is failing between NPS and EntraID.&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2024 13:42:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-and-mfa-for-device-admin/m-p/5115633#M589613</guid>
      <dc:creator>JPavonM</dc:creator>
      <dc:date>2024-05-24T13:42:12Z</dc:date>
    </item>
  </channel>
</rss>

