03-15-2018 01:18 PM - edited 03-12-2019 05:07 AM
I can find a bunch of documentation on how to install an on premise Azure MFA server however we are already setup for the cloud version of MFA and don't want to migrate on premise with that. I would like to integrate our Cisco ASA VPNs using Cisco AnyConnect Secure Mobility client to use the cloud based Azure MFA and Microsoft Authenticator. Is this possible? Anyone tried this or point me in the right direction on the minimum amount of work to configure this setup?
10-14-2019 05:58 AM
11-02-2019 11:43 AM
Here it describes scenario for Citrix and asa
https://docs.microsoft.com/bs-latn-ba/azure//active-directory/authentication/howto-mfaserver-nps-vpn
10-14-2019 10:17 AM
Hi Philip,
Do you have a link to this announcement?
Thanks,
Mark
11-02-2019 11:40 AM
https://docs.microsoft.com/bs-latn-ba/Azure/active-directory/authentication/howto-mfaserver-nps-vpn
As of July 1, 2019, Microsoft will no longer offer MFA Server for new deployments. New customers who would like to require multi-factor authentication from their users should use cloud-based Azure Multi-Factor Authentication. Existing customers who have activated MFA Server prior to July 1 will be able to download the latest version, future updates and generate activation credentials as usual.
03-27-2020 01:32 PM
Hi,
We have this mostly working but it does a MFA challenge every time you log into VPN. Is that what's happening for you?
05-06-2020 09:01 AM
06-23-2020 01:07 AM
How did you get around with expired password? NPS extension doesn't support renewing expired password. Users are not getting the prompt to renew their password when they login to Anyconnect with Azure MFA
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide