This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Duo Integration with Sophos XG for 2FA

Hello,

I have integrated Cisco Duo with Sophos XG (running firmware 18.01), but have issues with SSL VPN. My AD is my Primary authentication method, while Duo is my second factor authentication. When I test connection, all works well.

I have changed the SSL authentication method to use Duo first, when I try to VPN, I do receive a PUSH which I approve, but still fails (wrong username or something like that). I see it on Duo as successful, but still would not work.

Has anyone done this integration recently on firmware 18 now that we can set timeout values.

Thanks.



This thread was automatically locked due to age.

Top Replies

  • XG can do a authentication against a Radius OR a AD Server. So you get a username+password and XG and XG can forward this to a Radius OR AD to check, if this is a valid request. 

    If you use AD Server, there is no Integration of DUO what soever. 

    DUO and other systems offer a radius server. 

    If you setup a radius authentication, XG will create a new user. This new user originate from Radius, therefore the group membership is also from radius. 

    If you setup a SSLVPN, this user needs to be allowed via Radius. So the User or the group, COMING from radius, needs to be placed in SSLVPN. 

    I cannot explain in detail, how DUO work, but as far as i know, it can forward the AD Groups, itself gets from the AD server. 

    PS: The exact same mechanism is explained here: https://community.sophos.com/xg-firewall/f/recommended-reads/122575/sophos-xg-using-azure-mfa-for-ssl-vpn-and-user-portal

    Only for Azure MFA, which is basically the same service = Radius Server, which gives you a YES/NO. 

    Jump to answer
Parents
  • Hello Tobi,

    Thank you for contacting the Sophos Community!

    IF you put an incorrect password on purpose and check the /log/access_server.log, what is the error?

    Also try enabling debugging for the access server log, to turn it off run the same command.

    # service access_server:debug -ds nosync

    If you test the user accessing the User Portal does it work?

    Can you confirm the user that is using DUO has a group assigned to it, as new accounts might be created by the Radius auth, if this is the case add the user to the SSL VPN group and have the user to re-download the config and try again.

    Regards,


     
    Emmanuel (EmmoSophos)
    Technical Team Lead, Global Community Support
    Sophos Support VideosProduct Documentation  |  @SophosSupport  | Sign up for SMS Alerts
    If a post solves your question use the 'Verify Answer' link.
  • You need to specify DUO (Radius) for the User Portal as a Authentication service. 

    Then login via User portal (with DUO) and download the new SSLVPN Config. This config should work with DUO. 

    __________________________________________________________________________________________________________________

  • When I put Duo as the first authentication method in the user portal, I can do 2FA successfully to access the portal, but I can no longer see the SSL VPN tab in order to download the config. I see that tab only when I remove Duo from the authentication method.

    I do not understand this behaviour.

Reply
  • When I put Duo as the first authentication method in the user portal, I can do 2FA successfully to access the portal, but I can no longer see the SSL VPN tab in order to download the config. I see that tab only when I remove Duo from the authentication method.

    I do not understand this behaviour.

Children
No Data