<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
0D50Z00008Gj0sGSAROkta Classic EngineMulti-Factor AuthenticationAnswered2024-04-15T09:22:09.000Z2018-08-30T20:39:04.000Z2021-02-19T04:08:28.000Z
  • Steven,

     

    I'm assuming you've set up RADIUS and have authentication working already according to this guide:

    https://support.okta.com/help/s/article/Cisco-ASA-VPN-Configuration-Guide

     

    Once all of that is configured, in order to avoid the user being prompted by the Anyconnect client to select an MFA method, you have to enable the "Accept password and security token in the same login request" option on the Sign On tab of the RADIUS application. Then when the user enters their credentials, they must append ,push to the end of their password.

    Expand Post
  • grqtt (grqtt)

    Do you mean on the Cisco Anyconnect client to enter credentials in this format below?

    username: jdoe
    password: 1234567,push


    thanks
    Expand Post
    • PascalI.80546 (Domtar Inc)

      What would be the other options that we can pass as factor keywords ? I mean, push, sms and call keywords passed after the coma work perfectly but what about security question or verify (no push) ?

  • I'm not seeing the screen shot you shared. The option I mentioned can be found Okta Admin portal > Applications > Cisco ASA VPN (RADIUS) application > Sign On tab > in the Advanced RADIUS settings enable "Accept password and security token in the same login request"

     

    Once that's done, you're absolutely right. The username/password would look like:

    username: jdoe

    password: 1234567,push

    Expand Post
  • JerrellG.67360 (Customer)

    Hello Steve,

     

    There are a few different options, listed below are the current options available.

     

    Users must add a comma to the end of their password, followed by their security token or a second factor keyword(such as push, sms, call or email).

    Expand Post
  • grqtt (grqtt)

    ok but besides adding a comma to the end of their password and then entering either push, sms, call or email is their another way in automatically do push to the verify app for the user ?

    thanks



    .From: Okta Help Center (Lightning) <
    community@okta.com>
    Expand Post
This question is closed.
Loading
Okta verify automatic push only using Cisco Anyconnect vpn