Cisco AnyConnect is a uniform security endpoint agent which deliver multiple security services to protect the enterprise. Also, it provides visibility along with the control which is required you to identify who and which devices are accessing the extended enterprise.
You can enable two-factor authentication (2FA) for your Cisco AnyConnect Managed AD directory to increase security level. When you enable 2FA, your users enter their username and password (first factor) as usual, and they have to enter an authentication code (the second factor) which will share on your virtual or hardware 2FA solution. To enable 2FA you can enable RADIUS authentication in Cisco AnyConnect and configure policies in miniOrange to enable or disable 2FA for users.
miniOrange 2FA for VPN Login
The 2-factor authentication can be of two types depending on the VPN clients.
miniOrange provides user authentication from external directories like Microsoft Active Directory, Azure AD, AWS Cognito etc.
Can't find your Directory ? Contact us on email@example.com. We'll help you setting it up in no time.
Enable Two-Factor Authentication (2FA) for your VPN managed active directory to increase security level
Step 1: Add the Radius Client in miniOrange
|Client Name:||Any name for your reference|
|Client IP:||IP address of VPN server which will send Radius authentication request|
|Shared Secret:||Security key.
For Eg. "sharedsecret"
(Keep this with you, you will need to configure same on VPN Server )
|Do not Support Challenge:||Keep this Unchecked|
Only For On-Premise Version
Step 2: Setup Active Directory as an Authentication Source
|Directory Type:||Active Directory.|
|LDAP Server URL:||Select an appropriate prefiller followed by your AD server URL or IP address|
|Bind Account DN:||UserPrincipalName/distinguishedName of the account eligible for binding operation.|
|Bind Account Password:||Password for the account used for binding|
|Search Bases:||Provide distinguished name of the Search Base object Eg:cn=User,dc=domain,dc=com|
|Search Filter:||Search filters enable you to define search criteria and provide a more efficient and effective searches. Eg: "(&(objectClass=*)(cn=?))"|
|Activate LDAP||All user authentications will be done with LDAP credentials if you Activate it|
|Sync users in miniOrange||Users will be created in miniOrange after authentication with LDAP|
|Backup Authentication||If LDAP credentials fail then user will be authenticated through miniOrange|
|Allow users to change password||This allows your users to change their password. It updates the new credentials in your LDAP server|
|Enable administrator login||On enabling this, your miniOrange Administrator login authenticates using your LDAP server|
|Show IdP to users||If you enable this option, this IdP will be visible to users|
|Send Configured Attributes||If you enable this option, then only the attributes configured below will be sent in attributes at the time of login|
Step 3: Setup miniOrange as Identity Provider(Optional)NOTE: Follow these steps if you want to keep your users in miniOrange and authenticate against them.
Step 4: Configure 2 Factor Authentication(2FA) for Admins:
Step 5: Setup 2FA Policy for End User.
Step 6: Configure Cisco AnyConnect with miniOrange RADIUS server
|Accounting Mode||Indicates how accounting messages are sent. Recommended single mode.|
|Reactivation Mode||Specifies the method by which failed servers are reactivated.|
|Dead Time||Time for which a RADIUS server is skipped over by transaction requests|
|Max Failed Attempts||Maximum number of retransmission attempts. Recommended 1.|
|Interface Name||Name of protected Cisco interface.||inside|
|Server IP||For on-premise version: IP of server where IDP(miniOrange) is installed
For cloud version: Contact us at firstname.lastname@example.org to get the IP
|Server Authentication Port||RADIUS authentication port.||It should be 1812|
|Server Accounting Port||RADIUS accounting port||It should be 1813|
|Retry Interval||Length of time between retries||5|
|Server Secret Key||It shared between the miniOrange RADIUS Connector and its client||"sharedsecret"|
|Microsoft CHAPv2 Capable||Whether or not the RADIUS server uses CHAPv2.||It should be unchecked|
Step 7: Configure Timeout for Cisco AnyconnectCisco AnyConnect client will timeout after 12 seconds on Windows and after 30 seconds on Mac OS X by default.
Step 8: miniOrange 2FA for Cisco AnyConnect Login
We offer Security Solutions of Single Sign-On, Two Factor Authentication, Fraud Prevention and much more.
Please call us at +1978 658 9387 (US), +91 77966 99612 (India) or email us at email@example.com