09-26-2019 06:18 PM
Good evening, not sure if this is possible as I can't find any information on this. We have a working installation of Cisco Anyconnect terminating on an adaptive security appliance which forwards AuthC requests to ISE at our data center. ISE checks against AD and if the user is found access is permitted. Now we are looking to implement multi-factor authentication. Is it possible to somehow marry MFA into our existing solution OR do we need to move our RADIUS authentication off ISE and onto Azure?
Solved! Go to Solution.
09-26-2019 10:05 PM
If you're using Microsoft MFA, you can utilize that as the authentication server for the VPN connection then utilize Cisco ISE as the authorization-only server. I have this working in multiple environments. Users authenticate with username/password, the MFA then texts/calls them, and after successful authentication the requests are sent to ISE for authorization where you can check for AD Group membership, push different attributes for the VPN session, etc.
Here's a sample config:
tunnel-group MicrosoftMFA type remote-access tunnel-group MicrosoftMFA general-attributes authentication-server-group MFA authorization-server-group ISE accounting-server-group ISE default-group-policy MicrosoftMFA password-management
09-26-2019 07:25 PM - edited 09-26-2019 07:25 PM
If I were to simplify this question, "What is the best way to implement multi-factor authentication for Anyconnect while also using ISE as the AAA RADIUS server used by the ASA to forward authentication requests?"
09-26-2019 10:05 PM
If you're using Microsoft MFA, you can utilize that as the authentication server for the VPN connection then utilize Cisco ISE as the authorization-only server. I have this working in multiple environments. Users authenticate with username/password, the MFA then texts/calls them, and after successful authentication the requests are sent to ISE for authorization where you can check for AD Group membership, push different attributes for the VPN session, etc.
Here's a sample config:
tunnel-group MicrosoftMFA type remote-access tunnel-group MicrosoftMFA general-attributes authentication-server-group MFA authorization-server-group ISE accounting-server-group ISE default-group-policy MicrosoftMFA password-management
09-27-2019 11:15 AM
Thank you for your response. I will definitely give this a try and report back.
Cheers!
09-27-2019 11:23 AM
02-17-2022 05:48 AM
does this configuration work even if the authorisation is performed by ISE against AD groups on Azure Cloud?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide