Cisco ASA - RADIUS Configuration with Authentication Manager - RSA Ready Implementation Guide
This article describes how to integrate Cisco ASA with RSA Authentication Manager using RADIUS. Cisco ASA is managed by Cisco’s cloud firewall management solution known as Cisco Defense Orchestrator (CDO).
Configure RSA Authentication Manager
Perform these steps to configure RSA Authentication Manager using RADIUS.
Procedure
- Sign in to the Security Console and navigate to RADIUS > RADIUS Client.
- Click Add New and provide the following details.
- Client Name: Give any suitable name.
- ANY client: Select the checkbox.
- IP Address Type: IPV4.
- IPv4 Address: Management IP or Data-Interface IP address of the SECURE ASA Firewall.
- Make/Model: Standard Radius.
- Shared Secret: This should be the same as what was configured on the Cisco side.
- Click Save.
Configure Cisco Secure ASA using Cisco Defense Orchestrator
Perform these steps to configure to Cisco Secure ASA AnyConnect.
Procedure
- Sign in to CDO and browse to Objects.
- Click the + icon to create a new object.
- On the Add ASA Identity Source page, provide the following details and click Continue.
- Define the Object Name for RADIUS Server Group.
- Select the Device Type in the drop-down list.
- Select the RADIUS Server Group as the Identity Source Type.
- Click the + icon to define the RADIUS Server.
- Click Create New Radius Server.
- Provide RADIUS Server Object Name, select Device Type, define Server Name or IP Address of primary authentication manager machine, and provide Authentication Port and Server Secret Key.
- Click Add.
- Select the newly created RADIUS Server within the RADIUS Server Group.
- Save the RADIUS Server Group settings.
- Sign in to CDO, browse to VPN > ASA/FDM Remote Access VPN Configuration > AnyConnect Connection Profiles and edit your profile.
- For RADIUS, select AAA Only in the Authentication Type drop-down list and select your AAA Server Group in the Primary Identity Source for User Authentication drop-down list.
- Click Continue.
The Primary Identity Source for User Authentication drop-down list must contain at least one entry. Add one if unavailable, and click OK.
The configuration is complete.
Return to Cisco Adaptive Security Appliance (ASA) - RSA Ready Implementation Guide.
Related Articles
Cisco Nexus 9000v RSA Ready Implementation Guide 84Number of Views Cisco Nexus 9000v - RADIUS Client Configuration - RSA Ready Implementation Guide 40Number of Views Cisco Adaptive Security Appliance (ASA) - RSA Ready Implementation Guide 20Number of Views Canon Authorized Send - RSA Ready Implementation Guide 5Number of Views Cisco ASA - RADIUS Configuration with Cloud Authentication Service - RSA Ready Implementation Guide 65Number of Views
Trending Articles
An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process
Don't see what you're looking for?