Cisco ISE RADIUS Integration
Last updated
Last updated
This guide explains the configuration of multi-factor authentication (MFA) for Cisco ISE utilizing Mirket as the identity provider.
Cisco ISE offers various MFA configuration modes. In this integration, we've configured RADIUS authentication with Mirket.
Before proceeding with these procedures, ensure the following:
You've completed the installation and configuration of the Mirket (go to Mirket Installation Steps).
Cisco ISE initialization configuration has been completed.
Access your Cisco ISE server. Then click on the menu icon positioned on the upper left side.
Go to Administration > Identity Management > External Identity Sources.
Select the RADIUS Token and click on the Add option.
Enter a name for the RADIUS token identity source in the Name field. For this instance, we designated the identity source as MirketGW.
Select the Connection tab.
Input the IP address of the Mirket (Radius Server) in the Host IP field, under the Primary Server section. For this instance, the IP address stands at 192.168.1.100.
Input a shared secret key to communicate with the RADIUS server (Mirket Radius) in the Shared Secret field. In Mirket use this same secret key when configuring a RADIUS client resource.
Keep the remaining settings as default values.
Then click on Submit to save your RADIUS token identity source settings.
Click on the menu icon positioned in the upper left side and go to Administration > System > Admin Access > Authentication.
Select the Authentication Method tab. Then choose the Password Based radio box in the Authentication Type section.
Choose the RADIUS token identity source you previously created from the Identity Source dropdown list.
Then click on Save to confirm settings.
To enable Mirket to receive authentication requests from Cisco ISE, follow these steps:
Define Cisco ISE as a RADIUS client resource within Mirket.
Create an authentication policy for the Cisco ISE RADIUS client resource or include it in an existing authentication policy.
Attach the Cisco ISE resource to the Mirket Radius.
Before starting, ensure that you have installed Mirket Radius Gateway. To add a Radius Client to the Mirket Radius Gateway, follow these steps:
First, navigate to the directory C:\MirketRadius
and open the config.json
file.
Fill in the gateway and radiusClientList fields according to the provided specifications to ensure accurate and secure network configuration.
samName: Enter the SAM name of the gateway. In Mirket, user identification is done using the SAM (Security Account Manager) name. This is preferred over the standard username. This username is used for authentication and access controls. Please provide your domain name, such as 'mirket'.
authenticationPort: Enter the authentication port value you set for the gateway. The default value is 1812.
accountingPort: Enter the accounting port value you specified for the gateway. The default value is 1813.
gatewayIp: Enter the IP address of the server where the Mirket is installed.
ipAddress: Enter the IP address of your firewall.
secretKey: Enter your secret key. This secret key is used to link your radius client and radius server, so ensure they are identical.
Once you've made the necessary changes to the config.json file, save and close it. Note: You can add multiple RADIUS clients.
After completing the configuration, restart the 'Mirket Radius Gateway Service'.
To set up multifactor authentication, make sure you have at least one user group in Mirket.
If it is preferred to use a local user, first create a local group and then create a local user and make the user a member of the group.
If it is preferred to use LDAP users, the priority LDAP group is created by pulling users from Active Directory or OpenLDAP in Mirket.
Radius Rules define user access to resources and the authentication methods available (such as SMS, Approve / Deny, OTP etc.).
First, you should follow these steps:
Select Rules > Radius Rules.
Click on Add New.
Enter a rule name in the Name field.
Enter the rule description in the Description field.
Select the group to which the rule applies from the Group dropdown list.
Select the provider to which the rule applies from the Provider dropdown list.
Select the authorization profile to which the rule applies from the Authorization dropdown list.
Click on Save to confirm settings.
To validate the integration between Mirket MFA and your Cisco ISE, perform authentication using a mobile token on your mobile device. For RADIUS resources, available authentication methods include Approve/Deny authentication.
In this example, we illustrate the use of the Approve/Deny authentication method.
Go to the Cisco ISE URL in a web browser. Then choose the RADIUS token identity source you created in the Configure Cisco ISE section from the Identity Source dropdown list.
Enter your Mirket username in the Username field.
Input your password in the Password field.
Click on Login. Then, select the 'Approve' option(found in the Mirket mobile app) immediately and make sure it doesn't time out.