67-12
Cisco ASA 5500 Series Configuration Guide using the CLI
Chapter67 Configuring Connection Profiles, Group Policies, and Users
Configuring Connection Profiles
For example, the following command specifies the use of the CN attribute as the username for
authorization:
hostname(config-tunnel-general)# authorization-dn-attributes CN
hostname(config-tunnel-general)#
The authorization-dn-attributes are C (Country), CN (Common Name), DNQ (DN qualifier), EA
(E-mail Address), GENQ (Generational qualifier), GN (Given Name), I(Initials), L (Locality),
N(Name), O (Organization), OU (Organizational Unit), SER (Serial Number), SN (Surname),
SP (State/Province), T (Title), UID (User ID), and UPN (User Principal Name).
Step12 Specify whether to require a successful authorization before allowing a user to connect. The default is
not to require authorization.
hostname(config-tunnel-general)# authorization-required
hostname(config-tunnel-general)#
Configuring Double Authentication
Double authentication is an optional feature that requires a user to enter an additional authentication
credential, such as a second username and password, on the login screen. Specify the following
commands to configure double authentication.
Step1 Specify the secondary authentication server group. This command specifies the AAA server group to use
as the secondary AAA server.
Note This command applies only to AnyConnect client VPN connections.
The secondary server group cannot specify an SDI server group. By default, no secondary authentication
is required.
hostname(config-tunnel-general)# secondary-authentication-server-group [interface_name]
{none | LOCAL | groupname [LOCAL]} [use-primary-name]
If you use the none keyword, no secondary authentication is required. The groupname value specifies
the AAA server group name. Local specifies the use of the internal server database, and when used with
the groupname value, LOCAL specifies fallback. For example, to set the primary authentication server
group to sdi_group and the secondary authentication server group to ldap_server, enter the following
commands:
hostname(config-tunnel-general)# authentication-server-group
hostname(config-tunnel-general)# secondary-authentication-server-group
Note If you specify the use-primary-name keyword, then the login dialog requests only one
username. In addition, if the usernames are extracted from a digital certificate, only the primary
username is used for authentication.
Step2 If obtaining the secondary username from a certificate, specify the secondary-username-from-certificate
command:
hostname(config-tunnel-general)# secondary-username-from-certificate C | CN | ... |
use-script