04-16-2023 08:52 PM
I would like to see if it's possible to integrate Cisco ISE with Azure AD Multi-Factor authentication. Now I'm using Network Policy Server (NPS) to do Azure AD Multi-Factor authentication. Here is the netflow and configuration for easy understanding.
Use Azure AD Multi-Factor Authentication with NPS - Microsoft Entra | Microsoft Learn
04-16-2023 10:40 PM
ISE cannot simply take the place of NPS in this flow as it does not have a function to integrate with Azure AD MFA like the NPS extension.
Depending on what Use Case you are working with (VPN, Wired, Wireless, Device Admin, etc), you could configure ISE to use your existing NPS as a RADIUS Proxy. ISE would forward the RADIUS/TACACS+ requests to NPS to handle the Authentication + MFA, then ISE could perform the Authorization only piece based on the response from NPS.
If you are looking at the VPN use case, you could also have a Cisco ASA/FTD VPN headend perform the authentication via SAML + Azure MFA part itself and use ISE for the Authorization only part of the flow.
04-17-2023 01:51 AM
Thanks for your advice, Greg.
F5 VPN is my use case. Is it possible to share more details on how to have a Cisco ASA/FTD VPN headend perform the authentication via SAML + Azure MFA part itself and use ISE for the Authorization only part of the flow ?
04-17-2023 03:51 PM
I'm not aware of a single document that includes the entire flow, but you could use a combination of concepts from the following documents:
Configure ASA AnyConnect VPN with Microsoft Azure MFA through SAML
Integrate Azure MFA with Cisco AnyConnect VPN (does not properly use the tunnel-group 'authorize only' config)
VPN certificate auth using ISE? (discusses proper use of the tunnel-group 'authorize only' config)
04-18-2023 08:18 PM
Do you mean I need to add Cisco AnyConnect into Cisco ISE as external radius servers ? The flow is from F5 VPN - Cisco ISE PSN - Cisco AnyConnect - Azure AD, isn't it ?
09-10-2024 02:28 PM
Greg, Is there any document which can help to use for Device Admin which configure ISE to use existing NPS as a RADIUS Proxy. ISE would forward the RADIUS/TACACS+ requests to NPS to handle the Authentication + MFA, then ISE could perform the Authorization only piece based on the response from NPS
09-10-2024 03:56 PM
From the ISE perspective, the RADIUS Token piece would be similar to this example using Duo.
https://community.cisco.com/t5/security-knowledge-base/how-to-deploy-ise-device-admin-with-duo-mfa/ta-p/3821231
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide