Hi Thomas,
Yes, there are many options.
Basically ASA accept radius attributes returned for user (during user authentication)
You can return attribute:
IPsec-Split-Tunnel-List with the name of ACL on ASA which will be applied for that user (decides which traffic goes thru the tunnel, which not)
You can also use Radius IETF 25 Class attribute and set it to specific group policy name.
In that group policy on ASA you might want to have for example:
simultaneuous logins = 0
More:
http://www.cisco.com/en/US/docs/security/asa/asa84/command/reference/uz.html#wp1664777
http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/ref_extserver.html
---
Michal