03-10-2020 01:14 PM
I want my VPN users on a Cisco ASA to authenticate against ISE but use Azure AD for MFA on the backend. So far, it seems there are three ways to do this. My requirements are that I must use AnyConnect and ISE.
Solved! Go to Solution.
09-17-2021 06:31 AM
I ended up taking option # 3 and its working very well. ISE is acting as an authorization only server. Azure is performing authentication and conditional access. I honestly think that is a great solution.
03-16-2020 12:29 PM
Hi,
If you find option 3 to be best for you, yes, you can use SAML authentication and RADIUS/ISE authorization.
Regards,
Cristian Matei.
11-27-2020 05:57 AM
Hi Cristian,
I am looking forward for the option 3 which should now be supported from the ISE 3.0.
Can you guide me to some configured guide from Cisco which I could follow to set it up? (ASA - ISE - SAML IdP with Azure AD and Azure MFA)
I came across the limitation that Azure MFA is for ISE web portal auth only. Does it means I can't use it for Windows Always-On VPN with Anyconnect?
What would be the alternative to use? E.g. Duo instead of ISE to interconnect the ASA VPN termination through Duo with Microsoft MFA.
Thx.
Ivan
01-08-2021 10:40 AM
Is there any Cisco documentation, that is non duo based and fully caters to Any connect--Azure-Saml-ASA and ISE for authorization.Hoping we do need to spend time with TAC.
08-30-2023 04:24 PM
How should ise portion be configured (authentication)?
08-30-2023 08:32 PM
The flow for this would be:
ASA <-> AzureAD SAML + MFA (optional) <-> ISE AuthZ Only
With the ASA configured to use ISE for AuthZ Only, the Authentication Policy in ISE will be bypassed. As such, the default authC policy can be set to DenyAccess and the flow will still work.
Example ASA config from my lab using ISE 3.2
tunnel-group sslvpn-saml32 type remote-access
tunnel-group sslvpn-saml32 general-attributes
address-pool vpnpool
authorization-server-group ISE32_RAD
default-group-policy GroupPolicy_sslvpn-saml32
tunnel-group sslvpn-saml32 webvpn-attributes
authentication saml
group-alias sslvpn-saml32 enable
saml identity-provider https://sts.windows.net/xxx
!
aaa-server ISE32_RAD protocol radius
authorize-only
interim-accounting-update
dynamic-authorization
aaa-server ISE32_RAD (management) host 192.168.222.52
key *****
authentication-port 1812
accounting-port 1813
08-30-2023 08:53 PM
Thanks for the information... <span;>Under this scenario is it possible to implement posture also? Is there any cisco document in which I can consult the traffic? I wanna know how Asa pass the authorization request to ISE
08-30-2023 09:26 PM
Yes, it is possible to include the ISE Posture flow for this use case. The Posture flow would be no different than the example in this ASA VPN video series.
The authorize only feature is described in the ASA Configuration Guide.
If you do not want to use ISE for authentication, select Use authorization only mode.
"This option indicates that when this server group is used for authorization, the RADIUS Access Request message will be built as an “Authorize Only” request as opposed to the configured password methods defined for the AAA server."
04-16-2024 11:33 AM
Hi Greg. I know this is an old post, but it's the only one I could find that's close to what I'm trying to accomplish.
I understand this flow ASA <-> AzureAD SAML + MFA (optional) <-> ISE AuthZ Only
However, what do you use as matching criteria for your AuthZ conditions?
09-17-2021 04:07 AM
Any update ?
The Azure AD ROPC works only with 802.1X correct ?
09-17-2021 06:31 AM
I ended up taking option # 3 and its working very well. ISE is acting as an authorization only server. Azure is performing authentication and conditional access. I honestly think that is a great solution.
09-17-2021 06:51 AM
thank you !!
i will try it .
09-17-2021 12:50 PM
Hi Josh,
Do you have any documentation, as to how, you used ISE for authorization in this azure ASA saml scenario option 3 for Anyconnect ?
I get failed authorizations on the UPN name in ISE , as email/UPN auths are done by azure AD.
Any info is appreciated.
Thank you
09-17-2021 01:31 PM
If you're using FTD, you must define the SAML server for authentication, and an authorize-only server for ISE authorization and accounting. This tripped me up when I first tried. With this setup, authentication is first sent to Azure. if accepted, FTD then sends authorization only request to ISE.
09-17-2021 01:50 PM
Thank you Josh,
We do not use FTD, but we use ASA, ISE is selected as Authorization for Any connect connection profile. MFA is working fine, but for now failed authorizations are indicators of the connections. May be a TAC case needs to be opened.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide