This document describes how to set up multi-factor authentication (MFA) for Cisco® ISE with AuthPoint as an identity provider. Cisco ISE must already be configured and deployed before you set up MFA with AuthPoint.
The hardware and software used in this guide include:
- Cisco ISE v18.104.22.1687
- AuthPoint Gateway v22.214.171.124
Cisco ISE Configuration for RADIUS Authentication
AuthPoint communicates with various cloud-based services and service providers with the RADIUS protocol. This diagram shows an overview of the configuration required for RADIUS authentication.
Before You Begin
Before you begin these procedures, make sure that:
- You have finished the initialization configure of Cisco ISE
- A token is assigned to a user in AuthPoint
We recommend that you install the AuthPoint Gateway before you begin. For detailed steps, see About Gateways.
- Log in to your Cisco ISE server.
- Select Administration > External Identity Sources.
- Select RADIUS Token. Click Add.
- In the Name text box, type a name for the RADIUS token identity source. In our example, we name the identity source AuthPointGW.
- Select the Connection tab.
- In the Host IP text box, type the IP address of the AuthPoint Gateway. In our example, the IP address is 192.168.1.100.
- In the Shared Secret text box, type a shared secret key to use for communication with the RADIUS server (AuthPoint Gateway). You must use this same shared secret when you configure a RADIUS resource in AuthPoint in the Add a RADIUS Resource in AuthPoint section.
- Click Submit to save your RADIUS token identity source. Leave the default value for other settings.
- Select Administration > System > Authentication > Authentication Method.
- For Authentication Type , select Password Based.
- From the Identity Source drop-down list, select the RADIUS token identity source you created. In our example, we select the AuthPointGW identity source.
- Click Save.
Before AuthPoint can receive authentication requests from Cisco ISE, you must add Cisco ISE as a RADIUS client resource in AuthPoint. You must also assign an access policy for the Cisco ISE RADIUS resource to the AuthPoint group that will authenticate through Cisco ISE.
From the AuthPoint management UI:
- From the navigation menu, select Resources.
- From the Choose a Resource Type drop-down list, select RADIUS Client. Click Add Resource.
- In the Name text box, type a name for this resource.
- In the RADIUS client trusted IP or FQDN text box, type the Cisco ISE IP address.
- In the Value sent for RADIUS attribute 11 (Filter-Id) drop-down list, select User's AuthPoint group.
- In the Shared Secret text box, type the shared secret that you configured for the Cisco ISE in the previous section.
- Click Save.
Add an Access Policy to AuthPoint
You must have at least one user group in AuthPoint for authentication with Cisco ISE, and you must assign an access policy for the Cisco ISE resource to that group. If you already have a group, you do not have to add another group.
In the AuthPoint management UI:
- From the navigation menu, select Groups.
- To add a new group, click Add Group. If you already have a group that you want to use, click the Name of your group to edit it.
- In the Name text box, type a descriptive name for the group.
- (Optional) In the Description text box, type a description of the group.
- In the Access Policy section, click Add Policy.
- In the Add Policy dialog box, from the Resource drop-down list, select the resource you want to add an access policy for.
- (Optional) To require that users type their password before they authenticate for this resource, select the Require Password Authentication toggle.
- Select the authentication options users in this group can choose from when they authenticate.
For RADIUS resources, you can only choose OTP or Push. RADIUS resources cannot use the QR code authentication option.
- Click Add.
The access policy for your resource is added to the list.
- Click Save.
Bind the RADIUS Resource to a Gateway
To use RADIUS authentication with AuthPoint, you must have the AuthPoint Gateway installed on your corporate network and you must assign your RADIUS resources to the Gateway in the AuthPoint management UI. The Gateway functions as a RADIUS server.
If you have not already configured and installed the AuthPoint Gateway, see About Gateways.
To assign your RADIUS resources to the Gateway:
- From the navigation menu, select Gateway.
- Select the Name of the Gateway.
- In the RADIUS section, in the Port text box, type the port number used to communicate with the Gateway. The default ports are 1812 and 1645.
- In the Select a RADIUS resource drop-down list, select your RADIUS client resource.
- Click Save.
Add Users to AuthPoint
Before you assign users to a group, you must add the users to AuthPoint. There are two ways to add AuthPoint user accounts:
- Sync users from an external user database
- Add local AuthPoint users
Each user must be a member of a group. You must add at least one group before you can add users to AuthPoint.
To import users from Active Directory, Azure Active Directory, or an LDAP database, you must add an external identity in the AuthPoint management UI. External identities connect to user databases to get user account information and validate passwords.
- To sync users from Active Directory or an LDAP database, you must add an LDAP external identity
- To sync users from Azure Active Directory, you must add an Azure AD external identity
When you sync users from an external user database, you can sync any number of users and they are all added to AuthPoint at one time. Users synced from an external user database use the password defined for their user account as their AuthPoint password.
You can create local AuthPoint users on the Users page in the AuthPoint management UI. Because you can create only one user at a time, you most commonly do this when you want to create test users or to add only a small number of users.
Unlike users synced from an external user database, local AuthPoint users define and manage their own AuthPoint password. When you add a local user account, the user receives an email that prompts them to set their password.
To learn how to add local AuthPoint user accounts, see Add Local AuthPoint Users.
Test AuthPoint MFA
To test MFA with Cisco ISE, you can authenticate with the mobile token on your mobile device. For RADIUS authentication, you can authenticate with a push notification or a one-time password (OTP).
In this example, we show the OTP authentication method (users append the OTP for their token to their password).
- In a web browser, go to the Cisco ISE URL
- From the Identity Source drop-down list, select the RADIUS token identity source you created in the Configure Cisco ISE section. In our example, we select the AuthPointGW identity source.
- In the Username text box, type your user name.
- In the Password text box, type your password and the OTP for your token (shown in the AuthPoint mobile app). Do not add a space between your password and your OTP.
- Click Login.
You are logged in successfully.