"Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. At Cisco, customers come first, and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success."

SecureAuth IdP & Cisco

Cisco enables customers to detect and stop threats better with their network security products. Adding SecureAuth IdP to that equation creates an extra layer of security between users and the VPN, and subsequently, the VPN's protected resources.

SecureAuth IdP integrates with third-party products to enable a VPN (Virtual Private Network) connection between a network and computer for end-users physically located outside of an organization. An SSL (Secure Socket Layer) VPN protocol used with SecureAuth IdP creates a secure HTTPS session from a PC web browser to the application server being accessed. Additional software is not required since the web browser is used as the client application.

The end-user submits credentials via a VPN client which contacts the VPN server to authenticate and connect the remote user to the internal network. The VPN connection employs strong encryption for the end-user's access to restricted, private data, thereby keeping this data secure from the other users of the underlying network, which might be a public network such as the Internet.

The Cisco ASA product is an SSL VPN that establishes a secure remote access tunnel into the network and corporate resources, creating a protected access path to sensitive data. A Cisco ASA device integrated with SecureAuth IdP adds extra layers of security to provide remote end-users secure access to data and network resources anywhere and anytime, using any device.

The versatile SecureAuth IdP can integrate with Cisco products to enable 2-Factor Authentication access using one of many different methods, such as X.509 certificates or OATH OTPs (one-time passwords) via HTTP Form-post or the RADIUS protocol.

For certificate-based authentication scenarios, SecureAuth IdP enables easy certificate enrollment that does not require any manual or tedious labor for the customer. The user can securely enroll for a certificate before attempting access to Cisco, or Cisco can redirect users to SecureAuth IdP if a valid certificate is not present at login. Once the certificate is acquired, users can access Cisco and its protected resources based on its established trust with SecureAuth IdP (through certificates).

SecureAuth IdP can also act as a RADIUS Server, authenticating users via the RADIUS protocol to securely enable access to a RADIUS Client (Cisco, for example).