37-14
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 37 Configuring Clientless SSL VPN
Getting Started
hostname(config-username-webvpn)#
sso-server value sample
hostname(config-username-webvpn)#
Step 7
Finally, you can test the SSO server configuration using the
test sso-server
command in privileged
EXEC mode. For example, to test the SSO server, Example using the username Anyuser, enter:
hostname#
test sso-server Example username Anyuser
INFO: Attempting authentication request to sso-server sample for user Anyuser
INFO: STATUS: Success
SSO Server Configuration
Use the SAML server documentation provided by the server software vendor to configure the SAML
server in Relying Party mode.The following steps list the specific parameters required to configure the
SAML Server for Browser Post Profile:
Step 1
Configure the SAML server parameters to represent the asserting party (the security appliance):
•
Recipient consumer url (same as the assertion consumer url configured on the ASA)
•
Issuer ID, a string, usually the hostname of appliance
•
Profile type -Browser Post Profile
Step 2
Configure certificates.
Step 3
Specify that asserting party assertions must be signed.
Step 4
Select how the SAML server identifies the user:
•
Subject Name Type is DN
•
Subject Name format is uid=<user>
Configuring SSO with the HTTP Form Protocol
This section describes using the HTTP Form protocol for SSO. HTTP Form protocol is a common
approach to SSO authentication that can also qualify as a AAA method. It provides a secure method for
exchanging authentication information between users of clientless SSL VPN and authenticating web
servers. As a common protocol, it is highly compatible with web servers and web-based SSO products,
and you can use it in conjunction with other AAA servers such as RADIUS or LDAP servers.
Note
To configure SSO with the HTTP protocol correctly, you must have a thorough working knowledge of
authentication and HTTP protocol exchanges.
The security appliance again serves as a proxy for users of clientless SSL VPN to an authenticating web
server but, in this case, it uses HTTP Form protocol and the POST method for requests. You must
configure the security appliance to send and receive form data.
Figure 37-2
illustrates the following SSO
authentication steps:
1.
A user of clientless SSL VPN first enters a username and password to log into the clientless SSL
VPN server on the security appliance.
2.
The clientless SSL VPN server acts as a proxy for the user and forwards the form data (username
and password) to an authenticating web server using a POST authentication request.
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......