6.5 C
New York
Wednesday, November 27, 2024

Cisco Duo and ISE: Higher collectively within the cybersecurity battlefield


The world of cybersecurity by no means stops altering. Every single day unhealthy actors develop bolder and extra devious as they attempt to break your safety, steal your knowledge, and supply it again to you for ransom. They’ve turn into excellent at what they do, they usually solely want one small crack in your safety to wreak probably the most havoc. There are community sentries that guard your community, however the place one resolution is nice—two is a a lot stronger possibility.

Fortunately for you, Cisco Duo and ISE are the right pair to guard your community.

Why are Duo and ISE higher collectively?

Consider Cisco Duo’s multi-factor authentication (MFA) because the added layer of safety that verifies a consumer’s id on the time of login, like a high-tech forcefield that solely lets within the good guys by means of—if they’ve their secret passcodes. Think about Cisco ISE because the clever cohort, analyzing every thing from customers to gadgets. Collectively, they supply deep visibility into the customers and gadgets requesting entry to Digital Personal Community (VPN) and Terminal Entry Controller Entry Management System (TACACS+), making certain that community entry is granted solely to those that efficiently authenticate utilizing Duo MFA.

This weblog will cowl how Cisco Duo and ISE have partnered to strengthen organizational safety by making the Duo MFA integration course of with ISE simpler for IT admins. However you can too find out about how Cisco ISE and Duo work along with our newest At-A-Look.

What to anticipate from this replace?

Launched in November 2023, current clients using Cisco ISE with Duo now not want to keep up an exterior VM or server for the Duo Authentication  Proxy, in any other case generally known as a Duo Auth Proxy. (Duo Auth Proxy is an on-premises software program service that performs major authentication in opposition to LDAP listing, or RADIUS after which in flip contacts Duo for secondary authentication.)

This replace replaces Auth Proxy with Duo APIs to stop unauthorized customers requesting confidential entry to VPN community or their community entry machine (TACACS+).

Right here is how we’re enhancing integration expertise for IT admins:

Making authentication workflow less complicated

Cisco ISE will now deal with the first authentication and instantly transmit authentication requests to the Cisco Duo cloud for secondary authentication through APIs- Auth API and Admin API, eliminating the need to ascertain an exterior Duo Authentication proxy.

Natively integrating and managing MFA

Integration Wizard: Situated within the ‘Exterior Id Sources’ menu and beneath the ‘MFA’ tab.

  • Now within the Cisco ISE GUI, IT admins are guided by means of easy step-by-step wizard to combine ISE and Duo MFA eliminating in depth coaching or time required to do the duty. This upgraded ISE GUI for IT admins comes with none interference to the end-user expertise.
  • Along with the setup expertise, instantly within the ISE GUI, IT admins may also simply handle their Duo connections to re-specify which customers of Energetic Listing teams that they want to proceed with MFA and create insurance policies for particular consumer teams.

Create your MFA Insurance policies within the ‘Coverage Units’ Web page: Situated inside the ISE coverage tab beneath the sidebar

  • Now within the ISE coverage set web page, directors can create insurance policies catered particularly for multi-factor authentication guidelines. Every rule will specify the Duo connection(s) and the situations which have to be met to proceed by means of the multi-factor authentication course of.

Decreasing IT burden and prices

A good portion of Cisco Duo and ISE customers are leveraging Duo’s MFA capabilities by means of the present Duo Auth Proxy. Nonetheless, as we delve into the intricacies and expansiveness of those environments, it turns into clear that many purchasers not solely incur extra prices with deploying an equipment to host the Duo Auth Proxy but additionally allocate manpower to handle them. On account of leveraging Auth and Admin APIs-

  • No extra prices are incurred for exterior servers internet hosting the Duo Auth Proxy.
  • IT admins can spend much less time establishing, sustaining, and troubleshooting the mixing and extra time doing different extra significant issues.

Simpler authentication workflow with Auth API and Admin API

With elimination of the Duo Auth Proxy, the authentication workflow is less complicated and faster. Right here is the 4 steps course of for VPN and TACACS+ customers:

  1. Admin syncs checklist of AD teams from ISE to Duo utilizing the Admin API. Within the case of current teams or customers, ISE solely sends a listing of up to date ones stopping duplication.
  2. Cisco ISE receives a RADIUS authentication request and performs the first authentication in opposition to configured id supply.
  3. Cisco ISE invokes the Auth API which permits Duo to carry out the secondary authentication, or also called MFA
  4. Cisco ISE upon acknowledgement from MFA acceptance from Duo grant consumer entry to the community.

Because of Cisco ISE and Duo, not solely are you able to be the chief of your community’s safety resolution, but additionally put together your group for licensed entry with MFA, bolstering your defenses in opposition to digital threats and advancing safe authentication.

To be taught extra about what Cisco ISE and Duo can do collectively, assessment this At-A-Look.


We’d love to listen to what you assume. Ask a Query, Remark Under, and Keep Linked with Cisco Safety on social!

Cisco Safety Social Channels

Instagram
Fb
Twitter
LinkedIn

Share:



Related Articles

Latest Articles