Skip navigation
Documentation

Duo Two-Factor Authentication with LDAPS for Cisco ASA SSL VPN with Browser and Secure Client

Last Updated: November 21st, 2024

Duo integrates with your Cisco ASA VPN to add two-factor authentication to any VPN login.

The end-of-life date for Cisco ASA is February 20, 2025. Users logging into these applications will no longer be able to authenticate as of this date.

Direct LDAP connectivity to Duo for Cisco ASA reached the end of support on March 30, 2024. Customers may not create new Cisco ASA SSL VPN applications after September 2023.

We recommend you deploy Duo Single Sign-On for Cisco ASA with Secure Client to protect Cisco ASA with Duo Single Sign-On, our cloud-hosted identity provider featuring Duo Central and the Duo Universal Prompt.

Another alternative to direct LDAPS connections is adding Duo authentication to Cisco ASA using RADIUS and the Duo Authentication Proxy, for example, RADIUS with Automatic Push for Cisco ASA. See the "Related" links to the left to explore more RADIUS configurations.

Please visit the article Guide to end of support for the Duo LDAP cloud service (LDAPS) used to provide 2FA for Cisco ASA, Juniper Networks Secure Access, and Pulse Secure Connect Secure SSL VPN for further details, and review the Duo End of Sale, Last Date of Support, and End of Life Policy.

The instructions for this solution were removed on November 21, 2024. Customers who had this configuration deployed before then and need to refer to the original instructions may contact Duo Support.

Troubleshooting

Need some help? Take a look at the Cisco Frequently Asked Questions (FAQ) page or try searching our Cisco Knowledge Base articles or Community discussions. For further assistance, contact Support.

Network Diagram

Cisco AnyConnect or Secure Client LDAP Network Diagram
  1. Cisco SSL VPN connection initiated
  2. Primary authentication to on-premises directory
  3. Cisco ASA connection established to Duo Security over TCP port 636
  4. User completes Duo two-factor authentication via the interactive web prompt served from Duo's service or text input to the ASA and their selected authentication factor.
  5. Cisco ASA receives authentication response
  6. Cisco SSL VPN connection established