01-16-2008 04:40 AM - edited 03-11-2019 04:49 AM
Hi everyone,
I have a question that I hope you will answer for me. I'm running an ASA (8.0.2) and using the local Active Directory to authenticate the users while connecting with the VPN-Client and the Web SSL. So far so good, but is there any chances for the users to change the Active Directory password either from the VPN-Client or the Web SSL?
Kind regards
Per
Solved! Go to Solution.
01-16-2008 06:13 AM
This is the command you are looking for.
password-management
http://cisco.com/en/US/docs/security/asa/asa71/command/reference/p_711.html#wp1643267
Once enabled on the firewall all you have to do is make sure you are allowing mschap v2 in your remote access policy on IAS server.
When the user connects to the vpn and their password has expired, it will prompt them to change their password.
hostname(config)# tunnel-group group-name general-attributes
hostname(config-tunnel-general)# password-management
There is also a checkbox in the remote access policy in IAS to "allow user to change password after it expires"...check it.
See this post also...
01-16-2008 06:13 AM
This is the command you are looking for.
password-management
http://cisco.com/en/US/docs/security/asa/asa71/command/reference/p_711.html#wp1643267
Once enabled on the firewall all you have to do is make sure you are allowing mschap v2 in your remote access policy on IAS server.
When the user connects to the vpn and their password has expired, it will prompt them to change their password.
hostname(config)# tunnel-group group-name general-attributes
hostname(config-tunnel-general)# password-management
There is also a checkbox in the remote access policy in IAS to "allow user to change password after it expires"...check it.
See this post also...
01-16-2008 06:19 AM
Hi,
Thanks a lot!
Kind regards
Per
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide