1-31
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Clientless SSL VPN
Using Single Sign-on with Clientless SSL VPN
Configuring SSO for Plug-ins
Plug-ins support single sign-on (SSO). They use the same credentials (username and password) entered
to authenticate the clientless SSL VPN session. Because the plug-ins do not support macro substitution,
you do not have the option to perform SSO on different fields, such as the internal domain password or
the attribute on a RADIUS or LDAP server.
To configure SSO support for a plug-in, you install the plug-in and add a bookmark entry to display a
link to the server, specifying SSO support using the csco_sso=1 parameter. The following examples
show plug-in bookmarks enabled for SSO:
ssh://ssh-server/?cisco_sso=1
rdp://rdp-server/?Parameter1=value&Parameter2=value&csco_sso=1
Configuring SSO with Macro Substitution
This section describes using macro substitution for SSO. Configuring SSO with macro substitution
allows for you to inject certain variables into bookmarks to substitute for dynamic values.
Note
Smart tunnel bookmarks support auto-signon but not variable substitution. For example, a SharePoint
bookmark configured for smart tunnel uses the same username and password credentials to log into the
application as the credentials used to log into clientless SSL VPN. You can use variable substitutions
and auto signon simultaneously or separately.
You can now use bookmarks with macro substitutions for auto sign-on on some web pages. The former
POST plug-in approach was created so that administrators could specify a POST bookmark with sign-on
macros and receive a kick-off page to load prior to posting the POST request. This POST plug-in
approach eliminated those requests that required the presence of cookies or other header items. Now an
an administrator determines the pre-load page and URL, which specifies where you want the post login
request sent. A pre-load page enables an endpoint browser to fetch certain information that is sent along
to the webserver or web application rather than just using a POST request with credentials.
The following variables (or macros) allow for substitutions in bookmarks and forms-based HTTP POST
operations:
•
CSCO_WEBVPN_USERNAME — user login ID
•
CSCO_WEBVPN_PASSWORD — user login password
•
CSCO_WEBVPN_INTERNAL_PASSWORD — user internal (or domain) password. This cached
credential is not authenticated against a AAA server. When you enter this value, the security
appliance uses it as the password for auto signon, instead of the password/primary password value.
Note
You cannot use any of these three variables in GET-based http(s) bookmarks. Only
POST-based http(s) and cifs bookmarks can use these variables.
•
CSCO_WEBVPN_CONNECTION_PROFILE —user login group drop-down (connection profile
alias)
•
CSCO_WEBVPN_MACRO1 — set with the RADIUS-LDAP Vendor Specific Attribute (VSA). If
you are mapping from LDAP with an ldap-attribute-map command, use the
WebVPN-Macro-Substitution-Value1 Cisco attribute for this macro. See the Active Directory
ldap-attribute-mapping examples at
http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/ref_extserver.html#wp1572118
.
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......