<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower Threat Defense with Anyconnect and Azure MFA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4086384#M1070245</link>
    <description>&lt;P&gt;Thank you Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe that the VPN configuration would be the same on FTD as on the ASA, but I was told we need the "secondary authentication" function for MFA to work which is available in version 6.4. (See screenshot below)&lt;/P&gt;&lt;P&gt;But now I am thinking it might only be necessary in cases where there is no ISE server available.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FTD_Seconary_Authentication.JPG" style="width: 702px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/74633iE192059F32BC4F78/image-size/large?v=v2&amp;amp;px=999" role="button" title="FTD_Seconary_Authentication.JPG" alt="FTD_Seconary_Authentication.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 15 May 2020 06:44:42 GMT</pubDate>
    <dc:creator>Chess Norris</dc:creator>
    <dc:date>2020-05-15T06:44:42Z</dc:date>
    <item>
      <title>Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4085606#M1070203</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am planing to implement a MFA solution using Microsoft Azure Cloud and so far most of the Cisco guides using DUO as an example and I have not find a good guide for setting it up with Azure MFA.&lt;/P&gt;&lt;P&gt;The components we are using are.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FTD for AWS 6.4&lt;/P&gt;&lt;P&gt;ISE 2.4&lt;/P&gt;&lt;P&gt;Anyconnect 4.6&lt;/P&gt;&lt;P&gt;Microsoft&amp;nbsp; AD + Azure Cloud MFA&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone set up a solution using similar components and can point me to a guide?&lt;/P&gt;&lt;P&gt;FTD as the option "&lt;SPAN&gt;Use secondary authentication&lt;/SPAN&gt;", but if I put the Azure MFA as secondary authentication server, would that mean ISE will be bypassed? I would still like to use ISE for logging purpose.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;/Chess&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 08:08:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4085606#M1070203</guid>
      <dc:creator>Chess Norris</dc:creator>
      <dc:date>2020-05-14T08:08:48Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4086060#M1070227</link>
      <description>&lt;P&gt;I have set this up (at least the Cisco side of things) using ASA.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA has ISE as authentication server and in ISE set up an External Identity source (Radius Token).&amp;nbsp; Other than that the configuration of AnyConnect is different on FTD I assume that the functionality, or how it works, is the same.&amp;nbsp; On ASA at least there is no special configuration needed to get MFA to work.&amp;nbsp; The popup window to enter the MFA code comes automatically when ISE requests additional authentication from the ASA.&lt;/P&gt;
&lt;P&gt;But you are correct that there is not much easily findable documentation regarding this scenario with FTD.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfaserver-nps-vpn" target="_self"&gt;https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfaserver-nps-vpn&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 18:44:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4086060#M1070227</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-05-14T18:44:52Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4086065#M1070228</link>
      <description>&lt;P&gt;seems that MFA server is no longer supported:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;As of July 1, 2019, Microsoft will no longer offer MFA Server for new deployments. New customers who would like to require multi-factor authentication from their users should use cloud-based Azure Multi-Factor Authentication. Existing customers who have activated MFA Server prior to July 1 will be able to download the latest version, future updates and generate activation credentials as usual.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 18:49:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4086065#M1070228</guid>
      <dc:creator>giovanni.augusto</dc:creator>
      <dc:date>2020-05-14T18:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4086117#M1070236</link>
      <description>&lt;P&gt;The poster is using Azure MFA as stated in his original post.&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 19:57:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4086117#M1070236</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-05-14T19:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4086129#M1070237</link>
      <description>&lt;P&gt;Of course,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to ask if you are using NPS with Azure MFA agent or Azure MFA server (which I read is going out of support).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In any way what is your experience? with Azure MFA through ISE do you authenticate using RADIUS only or do you need to enable SAML?&lt;/P&gt;&lt;P&gt;Also in such scenario if you can apply any type or additional condition like location rules from the originating user.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 20:13:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4086129#M1070237</guid>
      <dc:creator>giovanni.augusto</dc:creator>
      <dc:date>2020-05-14T20:13:12Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4086384#M1070245</link>
      <description>&lt;P&gt;Thank you Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe that the VPN configuration would be the same on FTD as on the ASA, but I was told we need the "secondary authentication" function for MFA to work which is available in version 6.4. (See screenshot below)&lt;/P&gt;&lt;P&gt;But now I am thinking it might only be necessary in cases where there is no ISE server available.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FTD_Seconary_Authentication.JPG" style="width: 702px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/74633iE192059F32BC4F78/image-size/large?v=v2&amp;amp;px=999" role="button" title="FTD_Seconary_Authentication.JPG" alt="FTD_Seconary_Authentication.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2020 06:44:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4086384#M1070245</guid>
      <dc:creator>Chess Norris</dc:creator>
      <dc:date>2020-05-15T06:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4114213#M1071765</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/256705"&gt;@Chess Norris&lt;/a&gt; - did you ever get this implemented? I am also looking to integrate Azure MFA with AnyConnect and FTD. I also have an ISE server, but I don't think ISE can work with AzureMFA/SAML yet.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 20:58:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4114213#M1071765</guid>
      <dc:creator>cfitzgerald</dc:creator>
      <dc:date>2020-07-06T20:58:19Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4114554#M1071785</link>
      <description>&lt;P&gt;No success yet. I have just created a TAC case, but I am not too optimistic. Looks like DUO is the way to go.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2020 12:34:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4114554#M1071785</guid>
      <dc:creator>Chess Norris</dc:creator>
      <dc:date>2020-07-15T12:34:53Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4119150#M1072063</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/500411"&gt;@cfitzgerald&lt;/a&gt;&amp;nbsp; We were able to get it to work finally. I was not involved in the NPS configuration, but the configuration in ISE was quite simple. We already added the NPS server as a "Radius token" in ISE and also created the authentication and authorization policy that matched the correct tunnel-group from FTD.&lt;/P&gt;&lt;P&gt;What we missed, was to add the radius token (NPS) server as an&amp;nbsp;&lt;SPAN&gt;Identity Source Sequence in the&amp;nbsp;All_User_ID_Store. After doing so, everything started to work.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;/Chess&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2020 12:35:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4119150#M1072063</guid>
      <dc:creator>Chess Norris</dc:creator>
      <dc:date>2020-07-15T12:35:18Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4119183#M1072065</link>
      <description>&lt;P&gt;Can you apply geolocation rules for authentication in Azure MFA?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you using Azure plugin in NPS?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2020 13:26:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4119183#M1072065</guid>
      <dc:creator>giovanni.augusto</dc:creator>
      <dc:date>2020-07-15T13:26:59Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4119827#M1072094</link>
      <description>&lt;P&gt;You should be able to add a geolocation rule if you want to block certain countrys for accessing the VPN portal or connect via Anyconnect.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure what they used on the Azure side. I was not part of that configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;/Chess&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2020 11:42:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4119827#M1072094</guid>
      <dc:creator>Chess Norris</dc:creator>
      <dc:date>2020-07-16T11:42:52Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4120173#M1072097</link>
      <description>&lt;P&gt;The Geolocation rule feature in FTD is not available for use with traffic TO the firewall, only traffic THROUGH the firewall.&lt;/P&gt;
&lt;P&gt;If the MFA solution has a Geolocation feature that can be used for this sort of protection.&lt;/P&gt;
&lt;P&gt;I believe is Azure, that's done has described here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition" target="_blank"&gt;https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For those using Duo MFA, it also has this feature.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2020 19:16:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4120173#M1072097</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-07-16T19:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4173798#M1075205</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/256705"&gt;@Chess Norris&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Can you please specify if you used an on-premise NPS server or the NPS extension for Azure AD on cloud? I'm trying to prepare a testing environment for AnyConnect access with FTD using ISE and Microsoft Azure MFA on-cloud but i was not able to find any document about it.&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Alessandro&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 16:15:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4173798#M1075205</guid>
      <dc:creator>alessandro.s</dc:creator>
      <dc:date>2020-10-26T16:15:10Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4173818#M1075207</link>
      <description>&lt;P&gt;You have to use an on-prem NPS server with the Azure MFA extension installed on it.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 16:47:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4173818#M1075207</guid>
      <dc:creator>cfitzgerald</dc:creator>
      <dc:date>2020-10-26T16:47:24Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4174372#M1075237</link>
      <description>&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;i found some documents about this type of implementation, i'll test in the next days to see if it works!&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 13:58:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4174372#M1075237</guid>
      <dc:creator>alessandro.s</dc:creator>
      <dc:date>2020-10-27T13:58:16Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4194683#M1076486</link>
      <description>&lt;P&gt;Hey Chess, we are also going to be attempting the implementation of Azure MFA (we have on premise AD that I have to join/sync with Azure AD) with our Anyconnect vpn and firepower 1120 FTD.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I am trying to determine is if we have to purchase cisco ISE separately or does our FTD software or underlying firmware on our FP1120 have an embedded ISE server? This is a core component from what I have read.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also I presume you had to configure a RADIUS sever to communicate with the NPS server - which I think would just be the Anyconnect host, no?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Dec 2020 18:01:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4194683#M1076486</guid>
      <dc:creator>sysnet_striver</dc:creator>
      <dc:date>2020-12-07T18:01:26Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4194711#M1076487</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1091497"&gt;@sysnet_striver&lt;/a&gt; Cisco ISE is not free. It is a licensed product and runs on its own separate server(s).&lt;/P&gt;</description>
      <pubDate>Mon, 07 Dec 2020 18:43:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4194711#M1076487</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-12-07T18:43:36Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4194722#M1076488</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1091497" target="_blank"&gt;@sysnet_striver&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;Cisco ISE is not free. It is a licensed product and runs on its own separate server(s).&lt;/SPAN&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;You don't need ISE to integrate with Azure MFA. ISE is a RADIUS server, just like Microsoft's NPS server role. You will need an on-prem NPS server with the Azure MFA extension installed.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Dec 2020 19:02:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4194722#M1076488</guid>
      <dc:creator>cfitzgerald</dc:creator>
      <dc:date>2020-12-07T19:02:47Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4267526#M1077061</link>
      <description>&lt;P&gt;After learning more about NAC, seems to me that ISE is not a must have as its functionality can be more or less achieved with Anyconnect and RADIUS/NPS server and Azure MFA.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2021 03:56:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4267526#M1077061</guid>
      <dc:creator>sysnet_striver</dc:creator>
      <dc:date>2021-01-06T03:56:36Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense with Anyconnect and Azure MFA</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4267592#M1077068</link>
      <description>&lt;P&gt;Or, as of FTD 6.7, you can just use SAML directly to Azure for Authentication. Only if you want to do additional things with authorization would you need an on-premise solution for an Authorization services (e.g. Microsoft NPS or Cisco ISE).&lt;/P&gt;
&lt;P&gt;More to come along this line when FTD 6.8 comes out...&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2021 07:07:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-with-anyconnect-and-azure-mfa/m-p/4267592#M1077068</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-01-06T07:07:08Z</dc:date>
    </item>
  </channel>
</rss>

