Skip navigation
Documentation

Duo Multifactor Authentication for Cisco ISE

Last Updated: December 17th, 2024

Overview

Cisco Identity Services Engine (ISE) Release 3.3 Patch 1 introduces direct integration of Duo as an identity source for ISE VPN and TACACS+ authentication.

If you're interested in a Duo MFA solution for ISE portals that includes Duo Universal Prompt, please see Duo Single Sign-On for Cisco ISE.

Requirements

Connectivity Requirements

This application communicates with Duo's service on SSL TCP port 443.

Firewall configurations that restrict outbound access to Duo's service with rules using destination IP addresses or IP address ranges aren't recommended, since these may change over time to maintain our service's high availability. If your organization requires IP-based rules, please review Duo Knowledge Base article 1337.

Effective June 30, 2023, Duo no longer supports TLS 1.0 or 1.1 connections or insecure TLS/SSL cipher suites. See Duo Knowledge Base article 7546 for additional guidance.

First Steps

Role required: Owner

  1. Sign up for a Duo account if you don't already have one.
  2. Log in to the Duo Admin Panel and navigate to ApplicationsProtect an Application.
  3. Locate the entry for Cisco ISE Auth API in the applications list. Click Protect to the far-right to configure the application and get your integration key, secret key, and API hostname. You'll need this information to complete your setup. See Protecting Applications for more information about protecting applications with Duo and additional application options.
  4. Click Protect an Application again and locate Cisco ISE Admin API in the applications list. Click Protect this Application to get your integration key, secret key, and API hostname. You will need to enter this information into the ISE admin console as well.
  5. While on the new Cisco ISE Admin API application's details page, scroll down to the "Permissions" section and enable Grant resource - Read, and Grant resource - Write.
  6. Click Save Changes.

Treat your secret key like a password

The security of your Duo application is tied to the security of your secret key (skey). Secure it as you would any sensitive credential. Don't share it with unauthorized individuals or email it to anyone under any circumstances!

Configure Duo as an Identity Source in ISE

Follow the deployment instructions for Duo Multifactor Authentication for Cisco ISE on cisco.com.

You will need to copy the integration keys, secret keys, and API hostname information for the Cisco ISE Auth API and Cisco ISE Admin API you created earlier from the Duo Admin Panel into the ISE console as directed.

Known Issues

  • You may receive a 401 error response when users sign into ISE with an email address or User Principal Name as the username. The current workaround is to use a username format that does not contain an @ symbol, like sAMAccountName. This issue is fixed in ISE 3.3 Patch 3.

  • The Cisco ISE API integration does not send client IP information to Duo. Duo's authentication logs may show the endpoint IP as 0.0.0.0. Duo policy settings that rely on IP address information, such as authorized networks and user location, will not apply.

  • Concatenation of passcodes to password for OTP authentication is not supported.

Troubleshooting

Need some help? Reach out to Duo Support for assistance with creating the Cisco ISE API applications in Duo, enrolling users in Duo, Duo policy questions, or Duo authentication approval issues. For assistance configuring or managing ISE devices please contact Cisco Support.