37-13
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 37 Configuring Clientless SSL VPN
Getting Started
Detailed Tasks: Configuring SSO with
SAML Post Profile
This section presents specific steps for configuring the security appliance to support SSO authentication
with SAML Post Profile. To configure SSO with SAML-V1.1-POST, perform the following steps:
Step 1
In webvpn configuration mode, enter the
sso-server
command with the
type
option to create an SSO
server. For example, to create an SSO server named Sample of type SAML-V1.1-POST, enter the
following:
hostname(config)#
webvpn
hostname(config-webvpn)#
sso-server sample type SAML-V1.1-post
hostname(config-webvpn-sso-saml)#
Note
The security appliance currently supports only the Browser Post Profile type of SAML SSO Server.
Step 2
Enter the
assertion-consumer-url
command in webvpn-sso-saml configuration mode to specify the
authentication URL of the SSO server. For example, to send authentication requests to the URL
http://www.Example.com/webvpn, enter the following:
hostname(config-webvpn-sso-saml)#
assertion-consumer-url http://www.sample.com/webvpn
hostname(config-webvpn-sso-saml)#
Step 3
Specify a unique string that identifies the security appliance itself when it generates assertions.
Typically, this issuer name is the hostname for the security appliance as follows:
hostname(config-webvpn-sso-saml)#
issuer myasa
hostname(config-webvpn-sso-saml)#
Step 4
Specify the identification certificate for signing the assertion with the
trust-point
command. An
example follows:
hostname(config)#
tunnel-group 209.165.200.225 type IPSec_L2L
hostname(config)#
tunnel-group 209.165.200.225 ipsec-attributes
hostname(config-tunnel-ipsec)#
trust-point mytrustpoint
Optionally, you can configure the number of seconds before a failed SSO authentication attempt times
out using the
request-timeout
command in webvpn-sso-saml configuration mode. The default number
of seconds is 5 seconds and the possible range is 1 to 30 seconds. To change the number of seconds
before a request times out to 8, for example, enter the following:
hostname(config-webvpn-sso-saml)#
request-timeout 8
hostname(config-webvpn-sso-saml)#
Step 5
Optionally, you can configure the number of times the security appliance retries a failed SSO
authentication attempt before the authentication times-out using the
max-retry-attempts
command in
webvpn-sso-saml configuration mode. The default is 3 retry attempts and the possible range is 1 to 5
attempts. To configure the number of retries to be 4, for example, enter the following:
hostname(config-webvpn-sso-saml)#
max-retry-attempts 4
hostname(config-webvpn-sso-saml)#
Step 6
After you configure the SSO server, you must specify SSO authentication for either a group or user. To
specify SSO for a group, assign an SSO server to a group policy using the
sso-server value
command
in group-policy-webvpn configuration mode. To specify SSO for a user, assign an SSO server to a user
policy using the same command,
sso-server value
, but in username-webvpn configuration mode. For
example, to assign the SSO server named Example to the user named Anyuser, enter the following:
hostname(config)#
username Anyuser attributes
hostname(config-username)#
webvpn
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......