02-01-2017 11:34 AM
Are there any white papers on configuration VPN Authorization in ISE using Azure MFA and AD?
Solved! Go to Solution.
02-02-2017 11:30 AM
Hi,
You can find information on ISE and Anyconnect design guides.
ISE Design & Integration Guides
With related to MFA, ISE support RSA secure ID, Radius token. You can also use an external server such as Symatec VIP with guest portal. You can look at the integration with Symantec for that from the design guide above.
ISE is supporting Azure AD with MFA for SAML 2.0 SSO at ISE end-user-facing webauth portals if the primary auth is form-auth authentication.
Now, ASA supports MFA with two different identity sources for authentication, you can use ISE as authorization only in such cases.
Thanks
Krishnan
02-01-2017 12:14 PM
if nothing for MFA how about whitepaper about using ISE for Anyconnect VPN authentication without MFA?
02-02-2017 11:30 AM
Hi,
You can find information on ISE and Anyconnect design guides.
ISE Design & Integration Guides
With related to MFA, ISE support RSA secure ID, Radius token. You can also use an external server such as Symatec VIP with guest portal. You can look at the integration with Symantec for that from the design guide above.
ISE is supporting Azure AD with MFA for SAML 2.0 SSO at ISE end-user-facing webauth portals if the primary auth is form-auth authentication.
Now, ASA supports MFA with two different identity sources for authentication, you can use ISE as authorization only in such cases.
Thanks
Krishnan
01-12-2018 06:37 AM
Hi imsheikh,
I was working on the same thing it looks like you are trying to do. We just set up an Azure MFA server to set up multi-factor for VPN and I also found that it works quite nice with accessing network devices. Since the MFA server is on-prem and uses our AD I used the Azure server as an external radius token server in ISE. The Azure server is now the Identity store I use in the Authentication Policy then, of course, AD groups for the Authorization policies. I found the results to work just as we needed. I did not have to set up the second authentication on the ASA. Using the MFA as the Authentication Policy identity store now when we log into Cisco gear or the VPN we can use either a token or a push notification. It is a little overkill for access to network gear but being a government organization we had a requirement for that. it works much like the DUO Auth Proxy.
09-11-2019 01:19 PM
Hi Richard,
Do you have the NPS w/ extension config that worked with ISE integration? I am attempting to setup ISE to NPS Azure MFA for device access like you have done by using RADIUS token server on ISE. I appreciate any assistance you can provide.
09-11-2019 01:41 PM
If you have your NPS server correctly working with Azure MFA, i.e. you can point VPN auth directly at NPS server and perform Azure MFA then you should be able to define the NPS server as an external RADIUS token server in ISE, ensure the ISE IPs are defined as RADIUS client on the NPS server and point VPN authentication to ISE.
Have you tried this and it isn't working?
09-11-2019 01:46 PM
Paul,
Doing device CLI login -> ISE -> NPS/AzureMFA as a first deployment. Would the NPS setup be the exact same as when used with ASA/VPN through NPS/MFA? If they are the same and can use the same policy, It may be a little easier to find documentation on the VPN setup.
Thank you,
Mark
09-11-2019 01:55 PM
02-26-2020 01:21 PM
Wanted to follow-up that I did get this working and wanted to add something that I was unable to find online. The examples I found online for device CLI MFA showed RADIUS configured on the device to ISE and then NPS /extension as RADIUS token server on ISE. You can use TACACS from device to ISE and RADIUS from ISE to NPS server. This is how I did it for device CLI MFA. It saved a lot of config changes on the Cisco devices.
04-21-2020 09:01 AM
07-06-2020 02:22 PM
Hello @MARK BAKER
Do have a good guide you followed to setup ISE > NPS/AzureMFA? (aka Token Server)
I need to integrate AzureMFA with AnyConnect VPN but using a FirePower devices, not an ASA, so direct AuthZ to AzureMFA is not possible.
07-07-2020 03:11 PM
07-07-2020 03:22 PM
10-26-2021 07:46 AM
Hey, do you have any documentation for how you implemented TACACS between network device and ISE & RADIUS between ISE and AZ MFA. Any help would be appreciated.
Thanks
10-26-2021 01:20 PM
See if this helps. I don't recall where I got this online, but it was provided by Richard Lucht. You might be able to find the file location and possibly more info by searching "Azure MFA Richard Lucht". I just used TACACS instead of RADIUS between the router/firewall and ISE. I may have used this in combination with other online info.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide