Skip to main content
Cisco Meraki Documentation

AnyConnect Authentication Methods

AnyConnect supports authentication with any of the following:

SAML
Certificate based authentication + Username & Password
RADIUS
Meraki Cloud
Active Directory

 

In beta:  
Systems Manager Sentry
authentication - Request access to join beta here

Certificate-only authentication - Request access to join beta by emailing meraki-anyconnect-beta@cisco.com

 

For more details on AnyConnect configuration, refer to the AnyConnect configuration guide.

SAML Authentication

SAML is an XML-based framework for exchanging authentication and authorization data between security domains. It creates a circle of trust between the user, a Service Provider (SP), and an Identity Provider (IdP) which allows the user to sign in a single time for multiple services. SAML can be used to authenticate with Identity providers and MFA solutions like, DUO, Okta, Onelogin, AzureAD, etc.

SAML authentication requires MX firmware version 16.16+ or 17.5+. For troubleshooting see SAML Troubleshooting guide

AnyConnect with SAML only supports SP initiated SSO flow and uses Redirect & POST during the exchange with the IdP

Setting up AnyConnect Authentication with DUO 
Setting up AnyConnect Authentication with Okta
Setting up AnyConnect Authentication with Onelogin
Setting up AnyConnect Authentication with Azure AD

To configure AnyConnect on the MX Appliance to authenticate with DUO via SAML, see below. The directions below do not include configuration of an authentication source, which is a requirement if using DUO as an Identify provider.

To setup SAML authentication, you need a Service provider (e.g. MX running AnyConnect), Identity Provider - DUO and a User.
 

  1. Configure your Identity Provider - IdP (DUO)

After configuration, your identity provider will provide you with a SAML metadata file. e.g. seen from DUO IdP below.

Service provider downloads needed

  1. Configure your AnyConnect Server on the MX

  • Set authentication method to SAML
    Authentication type set to SAML

  • Configure your AnyConnect URL - https://vtk-qpjgjhmpdh.dynamic-m.com (add “:port” to the end of the hostname if using a port other than 443)
    Please ensure your AnyConnect URL starts with https://

    Anyconnect server URL for SAML Authentication

  • Upload the SAML metadata xml file provided by your Identity provider to the MX.

    Upload box for SAML metadata file

Save your configuration and attempt to connect to the VPN to verify configuration.

 

Certificate-based authentication with Username & password

Certificate-based authentication with Username & password

The AnyConnect server on the MX supports client certificate authentication as a factor of authentication. If certificate authentication is enabled, the AnyConnect server will use the uploaded trusted CA certificate to validate authenticating clients before requesting for the users' credentials.

With certificate authentication, the administrator uploads a .pem or .crt file of the issuing CA certificate to the MX, and uploads a certificate signed by the same issuing CA to the end user's device.

On a Windows Machine, run MMC, add Certificates Snap-in, navigate to Personal > Certificates folder and import or request a new certificate.

Windows screenshot showing how to import or request a certificate

This will enable only devices that have a certificate signed by the Root CA to successfully authenticate to VPN. A common use case is for filtering non-corporate devices from authenticating to the VPN.

Authenticating users must input credentials once certificate authentication succeeds. If certificate authentication fails, the AnyConnect client will report certificate validation failure.

Certificate-only authentication is currently in beta, and Meraki Support is not currently able to assist with any issues relating to it. Please request access here or please await for the general availability release. 

Meraki Cloud Authentication

Use this option if an Active Directory or RADIUS server is not available, or if VPN users should be managed via the Meraki Cloud. To add or remove users, use the User Management section at the bottom of the page. Add a user by clicking "Add new user" and entering the following information:

  • Name: Enter the user's name.

  • Email: Enter the user's email address.

  • Password: Enter a password for the user or click "Generate" to automatically generate a password.

  • Authorized: Select whether this user is authorized to use the client VPN.

To edit an existing user, click on the user under the User Management section. To delete a user, click the X next to the user on the right side of the user list.

When using Meraki-hosted authentication, the user's email address is the username that is used for authentication.

Meraki cloud authentication screenshot


RADIUS Authentication

Use this option to authenticate users on a RADIUS server. Click Add a RADIUS server to configure the server(s) to use. Enter in the IP address of the RADIUS server, the port to be used for RADIUS communication, and the shared secret for the RADIUS server.

Radius authentication


Add MX security appliance as RADIUS clients on the NPS server.

In order for the MX to act as an authenticator for RADIUS, it must be added as a client on NPS. 

  1. Open the NPS server console by going to Start > Programs > Administrative Tools > Network Policy Server.

  2. In the left-side pane, expand the RADIUS Clients and Servers option.

  3. Right-click the RADIUS Clients option and select New.

  4. Enter a Friendly Name for the MX security appliance or Z teleworker gateway RADIUS client.

  5. Enter the IP address of your MX security appliance or Z teleworker gateway. This IP will differ depending on where the RADIUS server is located:

    • On a local subnet: use the IP address of the MX/Z on the subnet shared with the RADIUS server

    • Over a static route: use the IP address of the MX/Z on the subnet shared with the next hop

    • Over VPN: use the IP address of the MX/Z on the highest-numbered VLAN in VPN

  6. Create and enter a RADIUS Shared Secret (make note of this secret, you will need to add this to the dashboard).

Note: Currently only ASCII characters are supported for RADIUS shared secrets, unicode characters will not work correctly.

  1. Press OK when finished.
    NPS 2016 RADIUS MX Client

For additional information or troubleshooting assistance, please refer to Microsoft documentation on RADIUS clients.
 

Configure a RADIUS Connection Request

  1. In the NPS server console, navigate to Policies > Connection Request Policies.  Right-click the Connection Request Policies folder and select New.

  2. In the Connection Request Policy Wizard, enter a policy name and select the network access server type unspecified, then press Next.

  3. Click Add to add conditions to your policy. Access-request messages will need to meet these conditions to be allowed access.

  4. From the list of conditions, select the option for NAS-Port-Type. Select VPN Virtual and press Next

  5. Press Next on the next three pages of the wizard to leave the default settings intact.

  6. Review the settings, then press Finish.
    NPS 2016 RADIUS Connection Request

Configure a RADIUS Network Policy.

  1. In the left-side pane of the NPS server console, right-click the Network Policies option and select New.

  2. In the Network Policy Wizard enter a policy name and select the network access server type unspecified, then press Next.

  3. Click Add to add conditions to your policy.

  4. From the list of conditions, select the option for Windows Groups. Click Add Groups and enter the name you would like to give client VPN permission to. 

  5. From the list of conditions, select the option for NAS-Port-Type. Select VPN Virtual and press Next.

  6. Leave the default settings on the Specify Access Permission page and press Next.

  1. Deselect all checkboxes and select Unencrypted authentication (PAP, SPAP). An informational box will be displayed, press No to continue, and press Next. 

  2. Press Next on the next two pages of the wizard to leave the default settings intact. 

  3. Review the settings, then press Finish.
    NPS 2016 RADIUS Network Policy

Active Directory Authentication

Use this option if user authentication should be done with Active Directory domain credentials. You will need to provide the following information:

  • Short domain: The short name of the Active Directory domain.

  • Server IP: The IP address of an Active Directory server on the MX LAN.

  • Domain admin: The domain administrator account the MX should use to query the server.

  • Password: Password for the domain administrator account.

For example, considering the following scenario: Users in the domain test.company.com should be authenticated using an Active Directory server with IP 172.16.1.10. Users normally log in to the domain using the format "test/username" and you have created a domain administrator account with username "vpnadmin" and password "vpnpassword".

  • The Short domain would be "test"

  • The Server IP would be 172.16.1.10.

  • The Domain admin would be "vpnadmin"

  • The Password would be "vpnpassword"

 

active directory authentication

Note: Only one AD server can be specified for authentication with AnyConnect at the moment. The MX does not support mapping group policies via Active Directory for users connecting through the client VPN. Refer to this document for more information on integrating with client VPN.

Note: TLS is required to communicate with the Domain Controller for more details regarding TLS requirements please review our Certificate Requirements for TLS documentation. 

Multi-Factor Authentication with RADIUS or Active Directory as a Proxy

MFA can be configured with your RADIUS or Active Directory server. The MFA challenge takes place between the RADIUS/Active Directory/Idp and the user. The MX will not pass any OTP or PINs between the user and RADIUS. The user connects to the MX and gets prompted for username and password, the MX passes credentials to the RADIUS or AD server, then the RADIUS or AD server challenges the user directly (not through the MX). The user responds to RADIUS or AD server, possibly via push notification, etc, then the RADIUS or AD server tells the MX that the user has successfully authenticated. Only then is the user allowed access to the network. Refer to this document for more information on authentication.

RADIUS Time-Out

The default RADIUS time-out is three seconds. This is how long the AnyConnect server will wait for a response from the RADIUS sever before failing over to a different RADIUS server or ignoring the response entirely. To support two-factor authentication, you can increase the RADIUS time-out by modifying the RADIUS time-out field on the AnyConnect Settings page. The configurable time-out range is 1 - 300 seconds.

radius timeout configuration

Systems Manager Sentry Authentication

Sentry AnyConnect VPN is a special Cisco Meraki integration between MX and Systems Manager (SM) enrolled devices. This allows secure and automatic certificate-based Always On AnyConnect VPN for SM managed devices. SM managed devices will be sent all the proper configurations/certificates/app settings for an Always On VPN tunnel back to the MX. For SM enrolled devices the end users are not interrupted with any authentication/setup sets and the VPN tunnel will open automatically

Note: SM Sentry AnyConnect Authentication is currently in beta and requires SM or MX product teams to enable it. Please request access here or please await for the general availability release. 

Systems Manager Sentry Authentication Setup

On the Security & SD WAN > Client VPN > AnyConnect Settings page, find the Authentication and Access section. Set the Authentication Type to Systems Manager System Authentication. Then, click on Add Sentry Network and choose one or more Systems Manager networks and the desired tag scoping to allow all or a subset of the devices enrolled in SM to obtain this configuration. 

Firmware requirement MX 17.10 or higher

Systems manager sentry authentication setup

In the above image, all devices tagged with sentry-anyconnect-vpn in the SM network called Cisco-on-Cisco will receive the automatic Systems Manager Sentry AnyConnect VPN configuration. 

Note: The SM network and MX network must be part of the same Meraki organization. 

SM Sentry Technology

The SM enrolled devices will automatically be delivered the settings necessary to VPN via AnyConnect to the MX host. The Meraki Cloud Certificate Authority (CA) handles all the certificate management, so administrators do not need to be burdened with the complexities of certificate management, while also obtaining all of certificates security and authentication benefits. At a high level, the automatic Sentry AnyConnect VPN configuration to managed SM devices contains three main settings:

  1. SCEP certificate payload used for certificate-only authentication to MX via Meraki Cloud CA. 
  2. VPN payload with AnyConnect Always On enabled. This will automatically use the host:port configured on the MX Client VPN page. 
  3. Cisco Secure Client application with necessary managed app configurations. This app is necessary to enable the AnyConnect VPN app networking on devices. 
iOS and iPadOS

Currently, the Sentry AnyConnect VPN beta supports iOS and iPadOS only. To request beta access: fill out this form

Always On VPN tunnel requires Supervision

After the Cisco Secure Client app is installed, the device will prompt end users for notifications. This can be suppressed (automatically accepted so end users are not interrupted) by adding an optional Notification profile payload for Cisco Secure Client app in the SM > Settings page: 

Notification profile payload for Cisco Secure Client app in the SM Settings

If end users have the ability to remove the Cisco Secure Client app, then end users can disable the Always On VPN tunnel. To prevent end user's ability to remove the app (and thus keep the tunnel enabled), add a Home Screen Layout, set the app to be hidden via Restriction, and/or uncheck the removable option for the Cisco Secure Client app on the SM > Apps page

removable option for the Cisco Secure Client app on the SM Apps

To install the Cisco Secure Client app completely silently, a VPP license will need to be added. It is recommended to use VPP Device Assignment on the SM > Apps page:

VPP Device Assignment on the SM Apps

Android 

Support for Android is coming soon.

macOS 

Support for macOS is coming soon. 

Windows

Support for Windows is coming soon. 

  • Was this article helpful?