The world of cybersecurity by no means stops altering. Each day unhealthy actors develop bolder and extra devious as they attempt to break your safety, steal your information, and supply it again to you for ransom. They’ve change into excellent at what they do, they usually solely want one small crack in your safety to wreak essentially the most havoc. There are community sentries that guard your community, however the place one answer is sweet—two is a a lot stronger possibility.
Fortunately for you, Cisco Duo and ISE are the proper pair to guard your community.
Why are Duo and ISE higher collectively?
Consider Cisco Duo’s multi-factor authentication (MFA) because the added layer of safety that verifies a consumer’s identification on the time of login, like a high-tech forcefield that solely lets within the good guys via—if they’ve their secret passcodes. Think about Cisco ISE because the clever cohort, analyzing all the things from customers to units. Collectively, they supply deep visibility into the customers and units requesting entry to Digital Non-public Community (VPN) and Terminal Entry Controller Entry Management System (TACACS+), guaranteeing that community entry is granted solely to those that efficiently authenticate utilizing Duo MFA.
This weblog will cowl how Cisco Duo and ISE have partnered to strengthen organizational safety by making the Duo MFA integration course of with ISE simpler for IT admins. However you may as well study how Cisco ISE and Duo work along with our newest At-A-Look.
What to anticipate from this replace?
Launched in November 2023, present prospects using Cisco ISE with Duo now not want to keep up an exterior VM or server for the Duo Authentication Proxy, in any other case often called a Duo Auth Proxy. (Duo Auth Proxy is an on-premises software program service that performs major authentication towards LDAP listing, or RADIUS after which in flip contacts Duo for secondary authentication.)
This replace replaces Auth Proxy with Duo APIs to stop unauthorized customers requesting confidential entry to VPN community or their community entry gadget (TACACS+).
Right here is how we’re enhancing integration expertise for IT admins:
Making authentication workflow less complicated
Cisco ISE will now deal with the first authentication and instantly transmit authentication requests to the Cisco Duo cloud for secondary authentication by way of APIs- Auth API and Admin API, eliminating the need to ascertain an exterior Duo Authentication proxy.
Natively integrating and managing MFA
Integration Wizard: Situated within the ‘Exterior Identification Sources’ menu and below the ‘MFA’ tab.
- Now within the Cisco ISE GUI, IT admins are guided via easy step-by-step wizard to combine ISE and Duo MFA eliminating intensive coaching or time required to do the duty. This upgraded ISE GUI for IT admins comes with none interference to the end-user expertise.
- Along with the setup expertise, instantly within the ISE GUI, IT admins may simply handle their Duo connections to re-specify which customers of Lively Listing teams that they wish to proceed with MFA and create insurance policies for particular consumer teams.
Create your MFA Insurance policies within the ‘Coverage Units’ Web page: Situated throughout the ISE coverage tab below the sidebar
- Now within the ISE coverage set web page, directors can create insurance policies catered particularly for multi-factor authentication guidelines. Every rule will specify the Duo connection(s) and the situations which have to be met to proceed via the multi-factor authentication course of.
Decreasing IT burden and prices
A good portion of Cisco Duo and ISE customers are leveraging Duo’s MFA capabilities via the present Duo Auth Proxy. Nonetheless, as we delve into the intricacies and expansiveness of those environments, it turns into clear that many purchasers not solely incur extra prices with deploying an equipment to host the Duo Auth Proxy but in addition allocate manpower to handle them. Because of leveraging Auth and Admin APIs-
- No extra prices are incurred for exterior servers internet hosting the Duo Auth Proxy.
- IT admins can spend much less time establishing, sustaining, and troubleshooting the mixing and extra time doing different extra significant issues.
Simpler authentication workflow with Auth API and Admin API
With elimination of the Duo Auth Proxy, the authentication workflow is easier and faster. Right here is the 4 steps course of for VPN and TACACS+ customers:
- Admin syncs record of AD teams from ISE to Duo utilizing the Admin API. Within the case of present teams or customers, ISE solely sends a listing of up to date ones stopping duplication.
- Cisco ISE receives a RADIUS authentication request and performs the first authentication towards configured identification supply.
- Cisco ISE invokes the Auth API which permits Duo to carry out the secondary authentication, or also called MFA
- Cisco ISE upon acknowledgement from MFA acceptance from Duo grant consumer entry to the community.
Due to Cisco ISE and Duo, not solely are you able to be the chief of your community’s safety answer, but in addition put together your group for approved entry with MFA, bolstering your defenses towards digital threats and advancing safe authentication.
To be taught extra about what Cisco ISE and Duo can do collectively, assessment this At-A-Look.
We’d love to listen to what you assume. Ask a Query, Remark Under, and Keep Related with Cisco Safety on social!
Cisco Safety Social Channels
Share: