Cisco Systems and Two-factor Authentication
This page contains documentation on all of our tests adding WiKID two-factor authentication to Cisco Systems firewalls and VPNs, mostly for the ASA. Even if your specific device is not listed here, it will work! Cisco and WiKID both support RADIUS, and 99% of the time you will use it.
The quick way to two-factor authentication for Cisco
- Download the WiKID server.
- Install the WiKID server on-premises.
- Review our Guide to see if you want to incorporate AD for authorization.
- Come back here and see how to integrate your Cisco.
Note that almost all of these tutorials use RADIUS to add two-factor authentication, so you will want to know how to add a RADIUS network client to the WiKID server. The network client will be your radius server (NPS/ASA/Freeradius) or your VPN/remote access service.
- How to add mutual HTTPS authentication to a Cisco ASA SSL-IPSec VPN
- How to add two-factor authentication for Admin access to a Cisco ASA 5500
- How to add two-factor authentication to a Cisco ASA 5500/ADSM 6.2
- How to add two-factor authentication to a Cisco ASA 5500 Clientless SSL VPN
- How to configure a Cisco VPN concentrator for two-factor authentication from WiKID.
- How to open an SSH port on a Cisco FWSM/ASA with two-factor authentication
- How to add two-factor authentication to a Cisco ASA 5500 IPSec VPN
- NEW! How to add two-factor authentication to a Cisco ASA 5500 using the command line interface
"As good as any two-factor authentication on the market at a price that can't be beat." - Steve Garrett, Forestry Suppliers Inc.