<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA + Azure + MFA question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-azure-mfa-question/m-p/5326812#M1122542</link>
    <description>&lt;P&gt;we have working solution live&lt;/P&gt;
&lt;P&gt;ASA + MFA saml working as expected.&lt;/P&gt;
&lt;P&gt;reference :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215935-configure-asa-anyconnect-vpn-with-micros.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215935-configure-asa-anyconnect-vpn-with-micros.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 03 Sep 2025 12:59:26 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2025-09-03T12:59:26Z</dc:date>
    <item>
      <title>ASA + Azure + MFA question</title>
      <link>https://community.cisco.com/t5/network-security/asa-azure-mfa-question/m-p/5326422#M1122524</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I need your advice on integrating Microsoft Authenticator (Azure MFA) with my Cisco Always-On VPN setup.&lt;/P&gt;&lt;P&gt;My current setup:&lt;/P&gt;&lt;P&gt;Cisco ASA with SSL VPN (AnyConnect Secure Client, Always-On enabled)&lt;BR /&gt;Cisco ISE for authentication and authorization&lt;BR /&gt;Active Directory (DNS, domain domain.de)&lt;BR /&gt;Internal CA (certificates issued for users)&lt;BR /&gt;Group Policy: AOV (used for SSL VPN clients)&lt;BR /&gt;Configuration details (short version):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On ASA:&lt;BR /&gt;Connection profile: authentication method = certificate only (Primary field = UPN)&lt;BR /&gt;AAA server group = ISE&lt;BR /&gt;Address pools, DNS servers, split-tunneling list applied&lt;BR /&gt;Always-On enabled, start before logon, auto-reconnect configured&lt;/P&gt;&lt;P&gt;On ISE:&lt;BR /&gt;External identity source = AD (domain.de)&lt;BR /&gt;Authorization Profile: AOV → ASA VPN group policy = AOV&lt;BR /&gt;Policy Set: conditions = ASA as network device + Tunnel Group = AOV&lt;BR /&gt;Authentication protocols allowed: PAP, MSCHAPv2&lt;BR /&gt;So far, authentication works fine with AD + certificates.&lt;/P&gt;&lt;P&gt;What I want to add:&lt;BR /&gt;Second factor authentication with Microsoft Authenticator (Azure MFA) for Always-On VPN users.&lt;/P&gt;&lt;P&gt;My questions:&lt;BR /&gt;What is the recommended way to integrate ASA + ISE with Microsoft MFA?&lt;BR /&gt;Should I use Azure MFA NPS Extension (ISE → NPS → Azure MFA)?&lt;BR /&gt;Has anyone deployed this in production, and can share best practices?&lt;BR /&gt;Keep Always-On VPN (certificate + AD) but enforce MFA with Microsoft Authenticator for the AOV group.&lt;/P&gt;&lt;P&gt;Thanks in advance for your guidance!&lt;/P&gt;</description>
      <pubDate>Tue, 02 Sep 2025 12:26:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-azure-mfa-question/m-p/5326422#M1122524</guid>
      <dc:creator>divas80</dc:creator>
      <dc:date>2025-09-02T12:26:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA + Azure + MFA question</title>
      <link>https://community.cisco.com/t5/network-security/asa-azure-mfa-question/m-p/5326787#M1122538</link>
      <description>&lt;P&gt;Have you considered using SAML to Entra ID instead of bothering with ISE at all?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2025 12:08:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-azure-mfa-question/m-p/5326787#M1122538</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-09-03T12:08:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA + Azure + MFA question</title>
      <link>https://community.cisco.com/t5/network-security/asa-azure-mfa-question/m-p/5326812#M1122542</link>
      <description>&lt;P&gt;we have working solution live&lt;/P&gt;
&lt;P&gt;ASA + MFA saml working as expected.&lt;/P&gt;
&lt;P&gt;reference :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215935-configure-asa-anyconnect-vpn-with-micros.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215935-configure-asa-anyconnect-vpn-with-micros.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2025 12:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-azure-mfa-question/m-p/5326812#M1122542</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-09-03T12:59:26Z</dc:date>
    </item>
  </channel>
</rss>

