Table of Contents ....................................................................................................................................................... 2
Note: Using Cisco double authentication (an LDAP password plus a one-time password) is also
1.0 Introduction
The Cisco® Adaptive Security Appliances (ASA) enable remote and mobile employees, customers, and partners
to gain secure access to corporate Virtual Private Network resources and applications. Providing secure access
via a VPN over existing Internet connections requires strong, two-factor authentication to protect resources. The
ActivIdentity solutions that work with Cisco incorporate SSL VPN solutions with versatile, strong authentication
that is flexible, scalable, and simple to manage. ActivIdentity offers two solutions:
•ActivIdentity® 4TRESS™ AAA Server for Remote Access—Addresses the security risks associated
with a mobile workforce remotely accessing systems and data.
•ActivIdentity 4TRESS™ Authentication Server (AS)—Offers support for multiple authentication
methods that are useful for diverse audiences across a variety of service channels (SAML, Radius,
etc.), including user name and password, mobile and PC soft tokens, one-time passwords, and
transparent Web soft tokens.
1.1 Scope of Document
This document explains how to set up ActivIdentity 4TRESS AAA Web soft token authentication with Cisco
Adaptive Security Appliances. Use this handbook to enable authentication via a Web soft token for use with an
SSL-protected Cisco VPN.
1.2 Prerequisites
•The ActivIdentity 4TRESS AAA Server is up-to-date (v6.7) with LDAP users and groups already
configured.
• Cisco ASA version 8.x installed and configured.
• The Web soft token is configured to work with or without a PIN.
• Users have static LDAP passwords for access to the Self Help Desk to enroll web tokens.
• The Cisco login page has been customized (illustrated in this handbook).
possible. You can configure the sign-in page so that users can use a static LDAP password instead of
the web soft token PIN.
ActivIdentity 4TRESS AAA Web Tokens and Cisco ASA | Integration Handbook
This chapter describes how to manage a Cisco ASA. When a user signs into a Cisco ASA appliance, the Cisco
ASA forwards the user’s credentials to this authentication server to verify the user’s identity. You will create one
authentication server (an ActivIdentity 4TRESS AAA RADIUS Server) to validate the user’s one-time password
generated by a Web soft token.
2.1 Procedure 1: Create New Radius Server Instance
When using an external RADIUS server to authenticate Cisco ASA users, you must configure the server to
recognize the Cisco ASA as a client and specify a shared secret for the RADIUS server to use to authenticate the
client request.
To configure a connection to the RADIUS server on a Cisco ASA SSL VPN appliance and to define the RADIUS
Server instance, perform the following steps.
1. In the ASDM console, navigate to Configuration-> Remote Access VPN -> AAA/Local User, and then click AAA Server Groups.
2. Click Add at the far right of the page displayed.
The nearby dialog is displayed.
3. Enter a Server Group name, and then select RADIUS for the
Protocol.
4. Click OK.
Repeat the process to add a backup RADIUS server.
ActivIdentity 4TRESS AAA Web Tokens and Cisco ASA | Integration Handbook
5. In the AAA Server Groups section, select the RADIUS server group you just created.
6. In the Servers in the Selected Group section, click Add next to the Server Name or IP Address line.
7. Enter the appropriate information for your configuration.
• Server Name or IP Address—Specify the name or IP address.
• Server Authentication Port—Enter the authentication port value for the RADIUS server.
Typically, this port is 1812.
•Server Shared Secret—Enter a string. You will also enter this string when configuring the
RADIUS server to recognize the SA Series SSL VPN appliance as a client.
•Accept the other default settings.
8. Click OK. The RADIUS server is displayed in the Servers in the Selected Group section, as illustrated next.
ActivIdentity 4TRESS AAA Web Tokens and Cisco ASA | Integration Handbook