cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1458
Views
5
Helpful
2
Replies

FTD w/ Duo and LDAP Attribute Map

mumbles202
Level 5
Level 5

Is it possible to integrate Duo into a deployment w/ a working LDAP attribute map configuration.  Currently it's setup w/ the default map providing no access, and members of group 1 or group 2 get different access.  Would like to now add Duo integration so wanted to confirm if we'd still be able to maintain this setup, just using Duo as the authenticator rather than the current LDAP.  

 

Also, if anyone knows, if not all users will be migrated to Duo during testing is the best approach to simply create a 2nd connection profile and use the Duo proxy there?  That way users who don't have MFA enabled can still access the systems until they are able to be migrated.

2 Replies 2

marce1000
VIP
VIP

 

 - Check if this document can be helpful :

             https://community.cisco.com/t5/security-documents/duo-integration-options-for-cisco-anyconnect-vpn-with-asa-and/ta-p/4114832

 M.



-- ' 'Good body every evening' ' this sentence was once spotted on a logo at the entrance of a Weight Watchers Club !

Thanks for the link.  So it looks as though in this scenario I'd have to use the option for Duo Authentication Proxy and LDAP in order to maintain the attribute map?