ASA Azure MFA RADIUS
ASA Azure MFA RADIUS
Version 1.0
Azure Multi-Factor Authentication seamlessly integrates with your Cisco® ASA VPN appliance to provide
additional security for Cisco AnyConnect® VPN logins and portal access. Multi-factor authentication
(MFA) is combined with standard user credentials to increase security for user identity verification.
Azure supports several multi-factor authentication methods for the RADIUS protocol. Each method is a
challenge-response mechanism that occurs after primary authentication with standard user credentials.
• Phone call – users receive a phone call with instructions on how to complete login.
• Text message – users receive an SMS message that contains a verification code. Azure supports
two options for RADIUS:
§ One-way messaging requires users to enter a sent verification code in a prompt on the login
page.
§ Two-way messaging requires users to send the verification code by text message reply.
• Mobile app – users receive a push notification from client software installed on a smart device,
like a phone or tablet. The Azure Authenticator app is available for Windows Phone, iOS, and
Android.
• OATH token – users have a token that generates a verification code which is then entered in a
prompt on the portal login page. Azure supports two options:
§ Third-party OATH tokens can be imported to the system and synced with user accounts. A
common example is a hardware token like a key fob.
§ The Azure Authenticator app for smart devices can serve as an OATH token to generate
verification codes for Windows Phone, iOS, and Android devices.
This guide will help you to configure Azure Multi-Factor Authentication (MFA) server and Cisco ASA to
use the RADIUS protocol for AnyConnect VPN authentication.
Overview
The Azure Multi-Factor Authentication server acts as a RADIUS server. The Cisco ASA appliance acts a
RADIUS client. The RADIUS server works as a proxy to forward requests that use multiple authentication
factors to a target directory service. The proxy receives a response from the directory, which it sends to
the RADIUS client. Access is granted only when both the user credentials (primary authentication) and
the MFA challenge succeed. See the diagram in Figure 1 for reference.
2
6 challenge
8 response
MFA MFA
5 challenge
7 response
Push notification
Figure 1
The diagram above represents the logical process flow for MFA. The user experience for MFA is fairly
similar to traditional login. See Figure 2 for a description of the workflow.
123456 +
Figure 2
3
Guide Usage
The information in this guide explains the configuration common to most deployments. It is important
to note two things:
Information is based on the conditions described in the Prerequisites and Components sections. The
Conventions section provides usage information and details about the environment used for this guide.
Prerequisites
The following conditions are required to set up Azure MFA:
Deployments offering the mobile app authentication option will also require:
• MFA deployed on systems with Windows Vista or higher require the Mobile App Web service to
be installed.
• A user device with the Azure authentication application installed.
Components
The following conditions reflect the assumptions and scope for information described in this guide.
Conventions
Information is based on the following conditions.
4
• The OATH token method uses verification codes generated by the Azure Authentication app.
NOTE: While Azure MFA includes the option use Personal Identification Numbers (PINs) as an additional
factor to the supported authentication methods, that configuration is outside the scope of this guide.
RADIUS Authentication
First you will enable RADIUS authentication, and then add the VPN appliance as a client.
5
2. When the RADIUS Authentication tool opens, select Enable RADIUS authentication.
6
4. Click Add to open the Add RADIUS Client dialog box.
7
NOTE: This feature only applies when OATH token is not the method assigned to a user
account. When invoked, the user will be prompted to authenticate with a hardware token if
one is registered for the user account.
6. Select the Target tab.
7. Select Windows Domain; this will configure the MFA server to use AD for primary
authentication.
8
You have completed configuring RADIUS authentication and adding the VPN server as a RADIUS client.
Leave the Multi-Factor Authentication Server window open for the next task.
Directory Integration
Now you will connect to the directory service.
9
2. When the Directory Integration tool opens, select the Settings tab if necessary.
10
You have completed the MFA server directory service setup. Leave the Multi-Factor Authentication
Server window open for the next task.
11
2. When the Company Settings tool opens, select the General tab if necessary.
12
§ Text message – configure one of the following:
o One-Way and OTP from the drop menus:
13
§ Mobile app – select Standard from the drop menu:
Note: This option will require users to register their devices through the Azure
authentication app.
§ OATH token
NOTE: This guide provides information about using the OATH token method through the
Azure Authenticator app. While third-party tokens can be imported through the Multi-
Factor Authentication OATH Tokens feature, that function is outside the scope of this
this guide.
14
This completes the company information setup to designate the default authentication method for
RADIUS Authentication. Leave the Multi-Factor Authentication Server window open for the next task.
MFA Users
When the VPN appliance was configured as a RADIUS client, access was restricted to members of the
MFA Users group. This provides more control over remote access, and is a security best practice. Now
accounts need to be imported from the directory service.
15
2. When the Users tool opens, Click Import from Active Directory.
16
4. Select the user accounts you want to import.
17
b. In the Import Phone drop menu, select Mobile.
NOTE: For purposes of this guide we are designating the Mobile attribute for the phone
import setting. It is the most common option used for MFA.
18
7. Click OK in the import success dialog box.
8. Click the Close button on the import screen to return to the Users pane.
ASDM Console
Configure an authentication server on the VPN appliance that will send RADIUS authentication requests
to the Azure MFA server.
First you will configure a server group for the MFA RADIUS server. Next you need a connection profile
for AnyConnect to access the RADIUS server. Then you will create a profile to set a custom timeout value
to ensure that AnyConnect VPN clients have enough time to log in using MFA.
19
Create AAA Server Group
1. Log in to the Cisco ASDM console for the VPN appliance.
20
3. Click Add to create a new group.
21
4. The Add a new AAA Server Group dialog opens.
22
7. In the Servers in the Selected Group pane, click Add.
23
8. The Add AAA Server dialog opens.
24
Test Configuration
You can test the connection to MFA server to confirm that the connection is correctly configured.
25
3. Select a test option:
26
2. Leave default settings, except for the following:
a. Enable Cisco AnyConnect VPN Client access on the interfaces selected in table below –
confirm checkbox is selected.
27
b. Select the appropriate SSL interface access option.
28
d. Click Edit.
29
f. Navigate to Authentication|Method.
30
g. Confirm the following:
i. Method – make sure AAA is selected.
ii. AAA Server Group – make sure the group created for the MFA server is selected.
h. Click OK.
i. Click Apply to save the configuration.
31
Configure Timeout
1. Navigate to Remote Access VPN| Network (Client) Access |AnyConnect Client Profile.
32
2. Click Add.
33
3. The Add AnyConnect Client Profile dialog opens.
34
7. Leave default settings except for the following:
a. Click Preferences (Part 2).
35
b. Navigate to Authentication Timeout (seconds).
36
c. Change the value to 60 seconds. Large organizations may require a longer duration.
d. Click Server List.
37
e. Click Add.
f. Add the Cisco ASA Host Display Name and the FQDN/IP Address to the profile.
38
g. Click OK.
h. Click OK to save configuration changes to the VPN profile.
39
IMPORTANT: The AnyConnect Client Profile you just created must be installed on every device that will
use MFA authentication to avoid timeout issues during the login process. One way to accomplish this
would be to require clients to connect to the AnyConnect portal and then push the profile automatically.
The following instructions explain how to activate a user device through the MFA server Users Portal.
Please note the following requirements prior to getting started.
40
Requirements
• A device with the Azure Authenticator mobile application installed. The application can be
downloaded from the platform store for the following devices:
§ Windows Phone
§ Android
§ iOS
• The Azure Users Portal address.
• A computer to access the Users Portal.
• User credentials
Activate Device
NOTE: Information provided below is current as of the publication date, but is subject to change without
notice.
41
5. Open the mobile authentication app on the user device.
Example:
42
You have completed device activation.
Login
Now you are ready to test MFA authentication. Please note the requirements listed below before you
start.
General Requirements
• The Cisco AnyConnect VPN Client Profile installed on the device that will access the network
• The IP address or hostname for AnyConnect VPN access
• User credentials
Phone Call
Required: A phone with the number listed in the AD user account Mobile phone attribute.
43
4. The phone call will provide instructions to complete authentication.
Text Message
Required: An SMS-capable phone with the number listed in the AD user account Mobile phone
attribute.
44
4. Enter the verification code on the response prompt.
Example:
45
2. Enter user credentials.
3. Check the phone for a text message with the verification code.
Example:
Mobile App
Required: A device with the Azure Authenticator app activated.
46
2. Enter user credentials.
3. Check the device with Azure Authenticator for a prompt.
Example:
4. Click Verify.
5. The authentication application will communicate with the MFA server to complete
authentication.
Oath Token
Required: A device with the Azure Authenticator app activated.
47
2. Enter user credentials.
3. On the mobile device, open the Azure Authenticator app.
4. Retrieve a verification code from the app.
Example:
48
Successful authentication for the VPN connection is indicated by the client. Example:
This completes the setup and testing for Azure Multi-Factor Authentication using the RADIUS protocol in
a Cisco ASA/AnyConnect VPN appliance deployment.
49