This guide provides steps for enabling single sign-on (SSO) and multi-factor authentication (MFA) for Cisco's Adaptive Security Appliance (ASA) product using ManageEngine ADSelfService Plus' Enterprise SSO and MFA for cloud applications features.
The Enterprise SSO feature allows users to complete Active Directory authentication once and then access integrated SAML-based cloud applications without logging in again.
When enabling SSO for Cisco's VPN providers, admins can enable MFA for cloud applications feature to add additional authentication steps during AD-based single sign-on using any of the 18 authentication methods, including Yubico OTP, biometrics, Microsoft Authenticator, Google Authentication, Zoho OneAuth TOTP, and DUO Security.
ciscoasa> enable
ciscoasa# config t
ciscoasa(config)# crypto ca trustpoint adselfserviceplus
ciscoasa(config-ca-trustpoint)# enrollment terminal
ciscoasa(config-ca-trustpoint)# no ca-check
ciscoasa(config-ca-trustpoint)# crypto ca authenticate adselfserviceplus
-----BEGIN CERTIFICATE-----
..............................
.........certificate content...
..............................
-----END CERTIFICATE-----
quit
INFO: Certificate has the following attributes:
Fingerprint: *************
Do you accept this certificate? [yes/no]: yes
Trustpoint CA certificate accepted.
% Certificate successfully imported
openssl req -newkey rsa:2048 -nodes -keyout key.pem -x509 -days 365 -out certificate.crt
openssl pkcs12 -inkey key.pem -in certificate.crt -export -out certificate.p12
openssl base64 -in certificate.p12 -out certificate.base64
ciscoasa(config)# crypto ca import asa_saml_sp pkcs12 [yourPassword]
quit
INFO: Import PKCS12 operation completed successfully
ciscoasa(config)# webvpn
ciscoasa(config-webvpn)# saml idp https://demo.adselfserviceplus.com/iamapps/ssologin/custom_saml_app/69fe37783af4a3c22769ab3496eda8b41d4f6805
ciscoasa(config-webvpn-saml-idp)# url sign-in https://demo.adselfserviceplus.com/iamapps/ssologin/custom_saml_app/69fe37783af4a3c22769ab3496eda8b41d4f6805
ciscoasa(config-webvpn-saml-idp)# url sign-out https://demo.adselfserviceplus.com/iamapps/ssologout/custom_saml_app/69fe37783af4a3c22769ab3496eda8b41d4f6805
ciscoasa(config-webvpn-saml-idp)# trustpoint idp adselfserviceplus
ciscoasa(config-webvpn-saml-idp)# trustpoint sp asa_saml_sp
ciscoasa(config-webvpn-saml-idp)# base-url https://[yourASAbaseURL]
ciscoasa(config-webvpn-saml-idp)# signature
ciscoasa(config-webvpn-saml-idp)# timeout assertion 7200
ciscoasa(config)# webvpn
ciscoasa(config-webvpn)# tunnel-group-list enable
ciscoasa(config)# tunnel-group cloud_idp_adselfserviceplus type remote-access
ciscoasa(config)# tunnel-group cloud_idp_adselfserviceplus webvpn-attributes
ciscoasa(config-tunnel-webvpn)# authentication saml
ciscoasa(config-tunnel-webvpn)# group-alias cloud_idp enable
ciscoasa(config-tunnel-webvpn)# saml identity-provider [Entity ID]
ciscoasa(config)# show saml metadata cloud_idp_adselfserviceplus
............................................................................
............................................................................
entityID="https://<entity ID>/saml/sp/metadata/cloud_idp_adselfserviceplus"
............................................................................
........."https://<ACS value>/+CSCOE+/saml/sp/acs?tgname=/cloud_idp_adselfserviceplus"............
............................................................................
The steps given below will guide you through setting up the single sign-on functionality between ADSelfService Plus and Cisco ASA.
SSO has now been enabled for Cisco ASA.
Streamline access to your Cisco ASA SSL VPN with AD-based SSO secured by MFA
Download a free trial now! Request demoNeed further assistance? Fill this form, and we'll contact you rightaway.
Allow Active Directory users to self-service their password resets and account unlock tasks, freeing them from lengthy help desk calls.
Get seamless one-click access to 100+ cloud applications. With enterprise single sign-on, users can access all their cloud applications using their Active Directory credentials.
Intimate Active Directory users of their impending password and account expiry via email and SMS notifications.
Synchronize Windows Active Directory user passwords and account changes across multiple systems automatically, including Microsoft 365, Google Workspace, IBM iSeries, and more.
Strong passwords resist various hacking threats. Enforce Active Directory users to adhere to compliant passwords by displaying password complexity requirements.
Enable Active Directory users to update their latest information themselves. Quick search features help admins scout for information using search keys like contact numbers.