Configuring double authentication – Cisco ASA 5505 User Manual

Page 1438

Advertising
background image

67-12

Cisco ASA 5500 Series Configuration Guide using the CLI

Chapter 67 Configuring Connection Profiles, Group Policies, and Users

Configuring Connection Profiles

For example, the following command specifies the use of the CN attribute as the username for
authorization:

hostname(config-tunnel-general)# authorization-dn-attributes CN

hostname(config-tunnel-general)#

The authorization-dn-attributes are C (Country), CN (Common Name), DNQ (DN qualifier), EA
(E-mail Address), GENQ (Generational qualifier), GN (Given Name), I (Initials), L (Locality),
N (Name), O (Organization), OU (Organizational Unit), SER (Serial Number), SN (Surname),
SP (State/Province), T (Title), UID (User ID), and UPN (User Principal Name).

Step 12

Specify whether to require a successful authorization before allowing a user to connect. The default is
not to require authorization.

hostname(config-tunnel-general)# authorization-required

hostname(config-tunnel-general)#

Configuring Double Authentication

Double authentication is an optional feature that requires a user to enter an additional authentication
credential, such as a second username and password, on the login screen. Specify the following
commands to configure double authentication.

Step 1

Specify the secondary authentication server group. This command specifies the AAA server group to use
as the secondary AAA server.

Note

This command applies only to AnyConnect client VPN connections.

The secondary server group cannot specify an SDI server group. By default, no secondary authentication
is required.

hostname(config-tunnel-general)# secondary-authentication-server-group [interface_name]

{none | LOCAL | groupname [LOCAL]} [use-primary-name]

If you use the none keyword, no secondary authentication is required. The groupname value specifies
the AAA server group name. Local specifies the use of the internal server database, and when used with
the groupname value, LOCAL specifies fallback. For example, to set the primary authentication server
group to sdi_group and the secondary authentication server group to ldap_server, enter the following
commands:

hostname(config-tunnel-general)# authentication-server-group

hostname(config-tunnel-general)# secondary-authentication-server-group

Note

If you specify the use-primary-name keyword, then the login dialog requests only one
username. In addition, if the usernames are extracted from a digital certificate, only the primary
username is used for authentication.

Step 2

If obtaining the secondary username from a certificate, specify the secondary-username-from-certificate
command:

hostname(config-tunnel-general)# secondary-username-from-certificate C | CN | ... |

use-script

Advertising