Cisco ASA 5505 Configuration Manual page 1497

Asa 5500 series
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

Chapter 67
Clientless SSL VPN
Add/Edit SSO Servers
This SSO method uses CA SiteMinder and SAML Browser Post Profile. You can also set up SSO using
the HTTP Form protocol, or Basic HTML and NTLM authentication. To use the HTTP Form protocol,
see
command at the command line interface.
Fields
Modes
The following table shows the modes in which this feature is available:
Firewall Mode
Routed
Configuring Smart Tunnel Access
The Smart Tunnels table displays the smart tunnel lists, each of which identifies one or more applications
eligible for smart tunnel access, and its associated operating system. Because each group policy or local
user policy supports one smart tunnel list, you must group the nonbrowser-based applications to be
supported into a smart tunnel list. You can also specify which group policy homepage can use smart
tunnel (with the use-smart-tunnel CLI command or on the Configuration > Remote Access VPN >
Clientless SSL VPN Access > Group Policies > Edit > Edit Internal Group Policy of the GUI). Following
the configuration of a list, you can assign it to one or more group policies or local user policies. The
internal company resources are accessed through the VPN gateway, but smart tunnel allows direct
Internet access without going through the VPN gateway.
The Configuration > Remote Access VPN > Clientless SSL VPN Access > Portal > Smart Tunnels
window lets you do the following:
OL-20339-01
Configuring Session
Settings. To set use basic HTML or NTLM authentication, use the auto-signon
Server Name—If adding a server, enter the name of the new SSO server. If editing a server, this field
is display only; it displays the name of the selected SSO server.
Authentication Type—Display only. Displays the type of SSO server. The types currently supported
by the adaptive security appliance are SiteMinder and SAML Browser Post Profile.
URL—Enter the SSO server URL to which the adaptive security appliance makes SSO
authentication requests.
Secret Key—Enter a secret key used to encrypt authentication requests to the SSO server. Key
characters can be any regular or shifted alphanumeric characters. There is no minimum or maximum
number of characters. The secret key is similar to a password: you create it, save it, and configure
it. It is configured on the adaptive security appliance, the SSO server, and the SiteMinder Policy
Server using the Cisco Java plug-in authentication scheme.
Maximum Retries—Enter the number of times the adaptive security appliance retries a failed SSO
authentication attempt before the authentication times-out. The range is from 1 to 5 retries inclusive,
and the default is 3 retries.
Request Timeout—Enter the number of seconds before a failed SSO authentication attempt times
out. The range is from1 to 30 seconds inclusive, and the default is 5 seconds.
Security Context
Transparent Single
Multiple
Context
System
Cisco ASA 5500 Series Configuration Guide using ASDM
Configuring Smart Tunnel Access
67-33

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5510Asa 5540Asa 5520Asa 5550Asa 5580

Table of Contents