Link to home
Start Free TrialLog in
Avatar of Damian Gardner
Damian Gardner

asked on

Need to understand how to configure Azure AD in the Cloud to provide MFA for our Cisco ASA firewall

Hello - we have an ASA 5516x that our users access via AnyConnect VPN connections.  Currently it is password-protected only, and want to implement multifactor authentication for it, using our Azure AD in the Cloud account.  I am reading a white paper by Microsoft that talks about how to do this - except it was written before they got rid of the MFA Server.  So I'm having trouble applying the steps pertaining to configuring the MFA server, with doing it in Azure in the Cloud.  We have a Radius server we're already using on our on-premise Server 2016 AD server, which is mentioned in the directions.  So some guidance on the steps to take in the Azure account for this would be much appreciated, as nothing seems to directly relate to this specific scenario of post-MFA Server.  Unless someone knows of a helpful article somewhere for configuring Azure AD MFA with a Cisco ASA?  

Thanks for your help!
Damian   
ASKER CERTIFIED SOLUTION
Avatar of Rohit Anand
Rohit Anand
Flag of India image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of Damian Gardner
Damian Gardner

ASKER

sorry for my late response guys.  Thank you for the input and let me read through these helpful articles.  thank you and please standby
hey guys - very good articles and I think all I need is to install the NPS extension piece - so thank you for that.  I wanted to ask if you know how easily that NPS extention is toggled on and off, if needed?  Once I install that and configure it, it looks like its always on?  Is there a service or something I can then turn off if we ever have issues with it?  or would I have to uninstall it off the server to effectively turn it off?  

Thanks