1-13
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Connection Profiles, Group Policies, and Users
Configuring Connection Profiles
Note
If you use the
use-primary-name
keyword, then the login dialog requests only one username.
In addition, if the usernames are extracted from a digital certificate, only the primary username
is used for authentication.
Step 2
If obtaining the secondary username from a certificate, enter
secondary-username-from-certificate
:
hostname(config-tunnel-general)#
secondary-username-from-certificate C
|
CN
| ... |
use-script
The values for the DN fields to extract from the certificate for use as a secondary username are the same
as for the primary
username-from-certificate
command. Alternatively, you can specify the use-script
keyword, which directs the ASA to use a script file generated by ASDM.
For example, to specify the Common Name as the primary username field and Organizational Unit as
the secondary username field, enter the following commands:
hostname(config-tunnel-general)#
tunnel-group test1 general-attributes
hostname(config-tunnel-general)#
username-from-certificate cn
hostname(config-tunnel-general)#
secondary-username-from-certificate ou
Step 3
Use the
secondary-pre-fill-username
command in tunnel-group webvpn-attributes mode to enable
extracting a secondary username from a client certificate for use in authentication. Use the keywords to
specify whether this command applies to a clientless connection or an SSL VPN (AnyConnect) client
connection and whether you want to hide the extracted username from the end user. This feature is
disabled by default. Clientless and SSL-client options can both exist at the same time, but you must
configure them in separate commands.
hostname(config-tunnel-general)#
secondary-pre-fill-username-from-certificate
{
clientless
|
ssl-client
} [
hide
]
For example, to specify the use of pre-fill-username for both the primary and secondary authentication
for a connection, enter the following commands:
hostname(config-tunnel-general)#
tunnel-group test1 general-attributes
hostname(config-tunnel-general)#
pre-fill-username ssl-client
hostname(config-tunnel-general)#
secondary-pre-fill-username ssl-client
Step 4
Specify which authentication server to use to obtain the authorization attributes to apply to the
connection. The primary authentication server is the default selection. This command is meaningful only
for double authentication.
hostname(config-tunnel-general)#
authentication-attr-from-server
{
primary
|
secondary
}
For example, to specify the use of the secondary authentication server, enter the following commands:
hostname(config-tunnel-general)#
tunnel-group test1 general-attributes
hostname(config-tunnel-general)#
authentication-attr-from-server secondary
Step 5
Specify which authentication username, primary or secondary, to associate with the session. The default
value is primary. With double authentication enabled, it is possible that two distinct usernames are
authenticated for the session. The administrator must designate one of the authenticated usernames as
the session username. The session username is the username provided for accounting, session database,
syslogs, and debug output.
hostname(config-tunnel-general)#
authenticated-session-username
{
primary
|
secondary
}
For example, to specify that the authentication username associated with the session must come from the
secondary authentication server, enter the following commands:
hostname(config-tunnel-general)#
tunnel-group test1 general-attributes
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......