In the Cisco ASA Admin Console, click the Configuration button, and then click the Remote Access VPN button. Navigate to Network (Client) Access AnyConnect Client Profile, highlight the desired client profile, and click Edit, as shown below. In the screen that opens, select Preferences (Part 2), as shown below. Hello- I have a customer that is interested in ISE that is currently using OKTA for their 2FA/OTP. They want to know if ISE and OKTA can integrate together to provide: 2FA/OTP for RA-VPN users utilizing ASAs and AnyConnect 2FA/OTP for RADIUS/TACACS+ based device administration From what I was abl.
Okta Demo Using Cisco VPN - YouTube
This guide details how to configure Cisco ASA VPN to use the Okta RADIUS Server Agent.
Okta and Cisco ASA interoperate through RADIUS. For each Cisco ASA appliance, you can configure AAA Server groups which can be RADIUS, TACAS+, LDAP, etc. Using RADIUS, Okta’s agent translates RADIUS authentication requests from the VPN into Okta API calls.
Topics
- Before you begin
Before you begin
Before installing the Okta RADIUS Agent ensure that you have met these minimum requirements for network connectivity:
Source | Destination | Port/Protocol | Description |
---|---|---|---|
Okta RADIUS Agent | Okta Identity Cloud | TCP/443 HTTP | Configuration and authentication traffic |
Client Gateway | Okta RADIUS Agent | UDP/1812RADIUS(Default, may be changed in RADIUS app install and configuration) | RADIUS traffic between the gateway (client) and the RADIUS Agent (server) |
Cisco ASA VPN (SAML) | Okta
Supported factors
The following MFA Factors are supported:
When integrating with Okta RADIUS, the maximum supported number of enrolled factors is dependent on the size of resulting challenge message. Okta recommends that no more than eight ( 8 ) factor be enrolled at one time.
MFA Factor | Password Authentication Protocol PAP | Extensible Authentication Protocol - Generic Token Card EAP-GTC | Extensible Authentication Protocol - Tunneled Transport Layer Security EAP-TTLS |
---|---|---|---|
Custom TOTP Authentication | Supported | Supported | Supported |
Duo(Push, SMS and Passcode only) | Supported | Not supported | Not supported |
Supported | Supported | Not supported | |
Google Authenticator | Supported | Supported | Supported - as long as challenge is avoided. For example MFA only or password, MFA. |
Supported | Supported | Supported - as long as challenge is avoided. For example: MFA-only or password, MFA for TOTP. Push can work with primary auth + MFA as the push challenge is sent out-of-band. | |
Supported | Supported | Supported | |
Supported | Supported | Not supported | |
SMS authentication | Supported | Supported | Not supported |
Symantec VIP | Supported | Supported | Supported |
Supported | Supported | Not supported | |
Supported | Supported | Supported |
Note Vlc for mac free download full version latest. Minitab download for mac.
The U2F Security and Windows Hello MFA factors are not compatible with RADIUS-enabled implementations.
For additional information about the RADIUS apps refer to Configuring RADIUS applications in Okta.
Typical workflow
Task | Description |
---|---|
Download the RADIUS agent |
|
Install the Okta RADIUS Agent. |
|
Configure application |
|
Configure gateway |
|
Configure optional settings |
|
Test |
|
Related topics
- Current Cisco ASA and ADSM Configuration Guides: https://www.cisco.com/c/en/us/support/security/asa-5500-series-next-generation-firewalls/products-installation-and-configuration-guides-list.htm
- Installing the Okta RADIUS Agent under Windows or Linux.