Follow the instruction steps in this section to apply your RADIUS, SSO Agent or Authentication Agent configuration to Cisco ASA AnyConnect.
Before you begin: Configure the integration type that your use case will employ. Refer to the Integration Configuration Summary section for more information.
1. Login to Cisco ASDM and browse to Configuration > Remote Access VPN > Network (Client) Access > AnyConnect Connection Profiles and edit your profile.
2a. If integrating using RADIUS or Authentication Agent (SDI), select AAA from the method drop-down menu, your AAA Server Group from the drop-down menu and click OK.
2b. If integrating using SSO Agent select SAML from the method drop-down, your SAML Server from the drop-down menu and click OK.
Note: SSO Agent integrations require at least AnyConnect version 4.6.
3. Click Apply.
If you are integrating AnyConnect with RSA Cloud Authentication Service using RADIUS, complete the rest of the steps in this section; otherwise you are done.
4. Browse to Configuration > Remote Access VPN > Network (Client) Access > AnyConnect Client Profile and click to Edit the appropriate profile.
5. Open the Preferences (Part 2) tab, set the Authenticate Timeout to 60 and then open the Server List tab.
6. There must be at least one entry in the Server List. Verify that there is an entry or add one to the list and click OK.
7. Click Apply.
Configuration is complete.
Video Link - AnyConnect RADIUS integration with RSA Authentication Manager and Cloud Authentication Service.
Refer to the RSA Ready SecurID Access Implementation Guide for Cisco AnyConnect for information on how to configure Cisco AnyConnect; including software token automation.
Return to the main page for more certification related information.