09-22-2013 04:06 AM - edited 02-21-2020 10:00 PM
Password-management for vpn users is only supported by two protocols Radius and ldap. Radius password-management for vpn users requires the Radius server to be integrated with an Active Directory MS-AD server as the password management controls are set on the server.
Radius using Active Directory as the back end database so we can not send any warning messages to the end client about the days remaining for their password to expire. The password expiry will happen through Radius, when the change is required, and it is only at that moment user will be prompted to change the password. But users won't get the any pre-warning messages.
In order to configure ASA to communicate over MSCHAPv2 with radius, we should have "password-management" under the tunnel-group. This change would add a new field for the end user to enter the domain-name, however, it's optional. If you leave it blank, it would use the local domain.
With LDAP, we are using ASA/PIX version 7.2 or above, And if you want that warning message to appear, then you can try configuring ASA for LDAP authentication rather than RADIUS authentication. And too even LDAP over SSL that can provide warning messages, not plain LDAP. And for LDAP authentication, you would be required to configure the firewall appropriately and then make use of password-expiry feature on ASA.
The password is stored in the Active Directory on a user object in the unicodePwd attribute. This attribute can be written under restricted conditions, but it cannot be read. The attribute can only be modified; it cannot be added on object creation or queried by a search. In order to modify this attribute, the client must have a 128-bit Secure Socket Layer (SSL) connection to the server. For this connection to be possible, the server must possess a server certificate for a 128-bit RSA connection, the client must trust the certificate authority (CA) that generated the server certificate, and both client and server must be capable of 128-bit encryption. Please refer to this Microsoft article for details:
How To Change a Windows 2000 User's Password Through LDAP
It supports the "password-expire-in-days" option for LDAP only. ( Please read the usage guidelines)
Procedure for Configuring RADIUS Password Management
Note: "password-management password-expire-in-days X" will not work, use just "password-management"
If you wish to enable password management for LDAP on a Cisco ASA VPN profile, there are certain requirements to be met.
aaa-server LDAP-AD protocol ldap aaa-server LDAP-AD host <IP-of-Windows-AD> server-port 636 ldap-base-dn <AD base DN> ldap-scope subtree ldap-naming-attribute sAMAccountName ldap-login-dn <login user DN> ldap-login-password <password for login user DN> ldap-over-ssl enable server-type Microsoft ! ! ! tunnel-group DefaultWEBVPNGroup type remote-access tunnel-group DefaultWEBVPNGroup general-attributes authentication-server-group LDAP-AD default-group-policy DfltGrpPolicy password-management password-expire-in-days <number of days>
We can create a new user account with password settings "user must change password at next logon" or specific number of days whenever you
allow users to change their password. Configuring LDAP Authentication with Microsoft Active Directory: http://tools.cisco.com/squish/81752
Very good doc.
What about when two factor is used and still need password change with AnyConnect?
Thanks
Joe
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: