04-02-2024 03:32 AM
We have an old Cisco ASA (5508) which has Duo configured for AnyConnect VPN, but using local accounts ONLY for Admin/Management. We are moving to a new FirePower device (in ASA mode) and want to enable some sort of SSO or MFA for Administrators using ASDM and SSH.
I've tried setting up Duo in a similar way as our previous Anyconnect (using Authentication Proxy Server), but while it authenticates domain users, I cannot find a way to only allow members of a specific AD group. I've been able to do this using full-scale RADIUS (Microsoft NPAS) but want to then pass this through Duo for MFA.
I've read an old post (c.2019) that says Duo's RADIUS implementation cannot determine group membership....is this still the case?
Can anyone recommend the best way to achieve the following:
Restrict admin/management of a Firepower FPR1140 device using ADSM & SSH, to a specific AD user group and require MFA.
04-02-2024 04:16 AM
04-02-2024 04:53 AM
Thanks Ken, I've been struggling with this for a while and have already tried various methods, first of which was AAA using LDAP as it sounded like it should work. However, I could not get it to work as expected. The way I'd configured it, it seemed to allow any valid domain member to authenticate, regardless of whether or not they were in my specified FWAdmins group in AD. Then I read somewhere that LDAP can only be used for VPN rather than local device management. Don't know whether this was an old page, or whether it's just bad info.
04-02-2024 07:23 AM
04-02-2024 08:22 AM
To get group memberships you either have to use ldap_server_auto with ad_client (as another poster suggested) or radius_server_whatever with radius_client. A mixed config of radius_server_whatever with ad_client cannot get the group memberships.
So, if you already have NPS then point radius_client in authproxy.cfg to your NPS server, and specify pass_through_all=true in both the radius_client and radius_server_whatever sections. That way additional RADIUS attributes returned by AD via NPS (like group memberships) get passed back through the Duo proxy to the NGFW. https://help.duo.com/s/article/4785
The advantage of radius+radius over ldap+ldap is that ldap doesn't report the authenticating client's IP address but radius does (assuming the radius access-request includes an IP value for calling_station_id). So, the RADIUS auths will have location information in the Duo admin panel or at least a private network IP, but LDAP auths have no location info (0.0.0.0 IP).
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide