This guide provides steps for enabling single sign-on (SSO) and multi-factor authentication (MFA) for Cisco's Adaptive Security Appliance (ASA) product using ManageEngine ADSelfService Plus' Enterprise SSO and MFA for cloud applications features.
The Enterprise SSO feature allows users to complete Active Directory authentication once and then access integrated SAML-based cloud applications without logging in again.
When enabling SSO for Cisco's VPN providers, admins can enable MFA for cloud applications feature to add additional authentication steps during AD-based single sign-on using any of the 18 authentication methods, including Yubico OTP, biometrics, Microsoft Authenticator, Google Authentication, Zoho OneAuth TOTP, and DUO Security.
ciscoasa> enable
ciscoasa# config t
ciscoasa(config)# crypto ca trustpoint adselfserviceplus
ciscoasa(config-ca-trustpoint)# enrollment terminal
ciscoasa(config-ca-trustpoint)# no ca-check
ciscoasa(config-ca-trustpoint)# crypto ca authenticate adselfserviceplus
-----BEGIN CERTIFICATE-----
..............................
.........certificate content...
..............................
-----END CERTIFICATE-----
quit
INFO: Certificate has the following attributes:
Fingerprint: *************
Do you accept this certificate? [yes/no]: yes
Trustpoint CA certificate accepted.
% Certificate successfully imported
openssl req -newkey rsa:2048 -nodes -keyout key.pem -x509 -days 365 -out certificate.crt
openssl pkcs12 -inkey key.pem -in certificate.crt -export -out certificate.p12
openssl base64 -in certificate.p12 -out certificate.base64
ciscoasa(config)# crypto ca import asa_saml_sp pkcs12 [yourPassword]
quit
INFO: Import PKCS12 operation completed successfully
ciscoasa(config)# webvpn
ciscoasa(config-webvpn)# saml idp https://demo.adselfserviceplus.com/iamapps/ssologin/custom_saml_app/69fe37783af4a3c22769ab3496eda8b41d4f6805
ciscoasa(config-webvpn-saml-idp)# url sign-in https://demo.adselfserviceplus.com/iamapps/ssologin/custom_saml_app/69fe37783af4a3c22769ab3496eda8b41d4f6805
ciscoasa(config-webvpn-saml-idp)# url sign-out https://demo.adselfserviceplus.com/iamapps/ssologout/custom_saml_app/69fe37783af4a3c22769ab3496eda8b41d4f6805
ciscoasa(config-webvpn-saml-idp)# trustpoint idp adselfserviceplus
ciscoasa(config-webvpn-saml-idp)# trustpoint sp asa_saml_sp
ciscoasa(config-webvpn-saml-idp)# base-url https://[yourASAbaseURL]
ciscoasa(config-webvpn-saml-idp)# signature
ciscoasa(config-webvpn-saml-idp)# timeout assertion 7200
ciscoasa(config)# webvpn
ciscoasa(config-webvpn)# tunnel-group-list enable
ciscoasa(config)# tunnel-group cloud_idp_adselfserviceplus type remote-access
ciscoasa(config)# tunnel-group cloud_idp_adselfserviceplus webvpn-attributes
ciscoasa(config-tunnel-webvpn)# authentication saml
ciscoasa(config-tunnel-webvpn)# group-alias cloud_idp enable
ciscoasa(config-tunnel-webvpn)# saml identity-provider [Entity ID]
ciscoasa(config)# show saml metadata cloud_idp_adselfserviceplus
............................................................................
............................................................................
entityID="https://<entity ID>/saml/sp/metadata/cloud_idp_adselfserviceplus"
............................................................................
........."https://<ACS value>/+CSCOE+/saml/sp/acs?tgname=/cloud_idp_adselfserviceplus"............
............................................................................
The steps given below will guide you through setting up the single sign-on functionality between ADSelfService Plus and Cisco ASA.
SSO has now been enabled for Cisco ASA.
Streamline access to your Cisco ASA SSL VPN with AD-based SSO secured by MFA
Download a free trial now! Request demoNeed further assistance? Fill this form, and we'll contact you rightaway.
Free Active Directory users from attending lengthy help desk calls by allowing them to self-service their password resets/ account unlock tasks. Hassle-free password change for Active Directory users with ADSelfService Plus ‘Change Password’ console.
Get seamless one-click access to 100+ cloud applications. With enterprise single sign-on, users can access all their cloud applications with their Active Directory credentials. Thanks to ADSelfService Plus!
Intimate Active Directory users of their impending password/account expiry by mailing them these password/account expiry notifications.
Synchronize Windows Active Directory user password/account changes across multiple systems, automatically, including Office 365, G Suite, IBM iSeries and more.
Ensure strong user passwords that resist various hacking threats with ADSelfService Plus by enforcing Active Directory users to adhere to compliant passwords via displaying password complexity requirements.
Portal that lets Active Directory users update their latest information and a quick search facility to scout for information about peers by using search keys, like contact number, of the personality being searched.