cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Announcements

This community is for technical, feature, configuration and deployment questions.
For production deployment issues, please contact the TAC! We will not comment or assist with your TAC case in these forums.
Please see How to Ask the Community for Help for other best practices.

21924
Views
11
Helpful
16
Replies
Highlighted
Cisco Employee

ISE using Azure MFA and AD

Are there any white papers on configuration VPN Authorization in ISE using Azure MFA and AD?

1 ACCEPTED SOLUTION

Accepted Solutions
Highlighted

Hi,

You can find information on ISE and Anyconnect design guides.

ISE Design & Integration Guides

With related to MFA, ISE support RSA secure ID, Radius token. You can also use an external server such as Symatec VIP with guest portal. You can look at the integration with Symantec for that from the design guide above.

ISE is supporting Azure AD with MFA for SAML 2.0 SSO at ISE end-user-facing webauth portals if the primary auth is form-auth authentication.

Now, ASA supports MFA with two different identity sources for authentication, you can use ISE as authorization only in such cases.

Thanks

Krishnan

View solution in original post

16 REPLIES 16
Highlighted
Cisco Employee

if nothing for MFA how about whitepaper about using ISE for Anyconnect VPN authentication without MFA?

Highlighted

Hi,

You can find information on ISE and Anyconnect design guides.

ISE Design & Integration Guides

With related to MFA, ISE support RSA secure ID, Radius token. You can also use an external server such as Symatec VIP with guest portal. You can look at the integration with Symantec for that from the design guide above.

ISE is supporting Azure AD with MFA for SAML 2.0 SSO at ISE end-user-facing webauth portals if the primary auth is form-auth authentication.

Now, ASA supports MFA with two different identity sources for authentication, you can use ISE as authorization only in such cases.

Thanks

Krishnan

View solution in original post

Highlighted

Hi imsheikh,


I was working on the same thing it looks like you are trying to do.  We just set up an Azure MFA server to set up multi-factor for VPN and I also found that it works quite nice with accessing network devices.  Since the MFA server is on-prem and uses our AD I used the Azure server as an external radius token server in ISE.  The Azure server is now the Identity store I use in the Authentication Policy then, of course, AD groups for the Authorization policies.  I found the results to work just as we needed.  I did not have to set up the second authentication on the ASA.  Using the MFA as the Authentication Policy identity store now when we log into Cisco gear or the VPN we can use either a token or a push notification.  It is a little overkill for access to network gear but being a government organization we had a requirement for that.  it works much like the DUO Auth Proxy.

Highlighted

Hi Richard,

Do you have the NPS w/ extension config that worked with ISE integration? I am attempting to setup ISE to NPS Azure MFA for device access like you have done by using RADIUS token server on ISE. I appreciate any assistance you can provide.

Highlighted

If you have your NPS server correctly working with Azure MFA, i.e. you can point VPN auth directly at NPS server and perform Azure MFA then you should be able to define the NPS server as an external RADIUS token server in ISE, ensure the ISE IPs are defined as RADIUS client on the NPS server and point VPN authentication to ISE.

 

Have you tried this and it isn't working?

Highlighted

Paul,

 

Doing device CLI login -> ISE -> NPS/AzureMFA as a first deployment. Would the NPS setup be the exact same as when used with ASA/VPN through NPS/MFA? If they are the same and can use the same policy, It may be a little easier to find documentation on the VPN setup.

 

Thank you,

Mark

Highlighted

It should be the same. At the end of the day it is just RADIUS calls into NPS. You can match on different RADIUS attributes in NPS if you want to build different policies. If you are ultimately going to go against ISE I would recommend keeping your NPS policy as generic as possible. Basically just have it run the MFA process. All the AD group checking stuff can occur in ISE.


Highlighted

Wanted to follow-up that I did get this working and wanted to add something that I was unable to find online. The examples I found online for device CLI MFA showed RADIUS configured on the device to ISE and then NPS /extension as RADIUS token server on ISE. You can use TACACS from device to ISE and RADIUS from ISE to NPS server. This is how I did it for device CLI MFA. It saved a lot of config changes on the Cisco devices.

Highlighted

Highlighted

Hello @MARK BAKER 

Do have a good guide you followed to setup ISE > NPS/AzureMFA? (aka Token Server)

I need to integrate AzureMFA with AnyConnect VPN but using a FirePower devices, not an ASA, so direct AuthZ to AzureMFA is not possible.

Highlighted

New ZixCorp secure email message from Beacon Health Options

To view the secure message, click on the link below or copy and paste the link into your Internet browser address bar.

https://securemail-valueoptions.com/s/e?m=ABAaA5qVYKNGKd0VJGIvh5jp&c=ABCuAEoOylrg13RyZzJuX4Xf&em=ciscosupport%2eprod%7c914b1085%7cd159a44c%2dbfe0%2d4c39%2db348%2d3283c55c7cc2%40reply01%2elithium%2ecom

You are reading the plaintext version of this message. For a better user experience, change your email settings to enable the viewing of HTML.

Do not reply to this notification message; this message was auto-generated by the sender's security system. To reply to the sender, click on the link above.

The secure message expires on Jul 07, 2021 @ 10:11 PM (GMT).

Want to send and receive secure email messages transparently? http://www.zixcorp.com/info/zixmail_ZMC
Highlighted

The gateway type used shouldn’t matter-in my case ASA -only communicates (radius) with ISE . Below is my design diagram. Use NPS (ISE token server) for your Identity source (typically this is AD) for authentication policy. I used a similar setup guide as the attached. https://community.cisco.com/kxiwq67737/attachments/kxiwq67737/4561-docs-security/5748/1/Multi-Factor%20Authentication%20with%20ISE.pdf My design diagram image.png
Highlighted

ISE


@paul wrote:
It should be the same. At the end of the day it is just RADIUS calls into NPS. You can match on different RADIUS attributes in NPS if you want to build different policies. If you are ultimately going to go against ISE I would recommend keeping your NPS policy as generic as possible. Basically just have it run the MFA process. All the AD group checking stuff can occur in ISE.




RADIUS Token Server Supported Authentication Protocols

ISE Radius token with NPS solution only supported PAP protocol (ISE 2.4). Do you know if MSCHAPv2 protocol is now supported by ISE?

 

https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_01101.html

 

Highlighted
Beginner

Is there any document that integrates Azure MFA on cloud 2020, with any-connect and all authorization from ISE, but Without ON PREM azure server . Microsoft no longer allows ON prep Azure MFA server. Has to be without DUO.

Content for Community-Ad