Guest

Cisco Secure Access Control Server for Windows

Installation and User Guide for Cisco Secure ACS 3.1 User-Changeable Passwords

 Feedback

Table of Contents

Installation and User Guide for Cisco Secure ACS User-Changeable Passwords
Installing UCP
Upgrading UCP
Uninstalling UCP
Changing Your Password
Related Documentation
Obtaining Documentation
Obtaining Technical Assistance

Installation and User Guide for Cisco Secure ACS User-Changeable Passwords


This document is effective for Cisco Secure ACS version 3.1, and contains instructions for installing and using Cisco Secure ACS User-Changeable Passwords (UCP), an application that enables users to change their passwords with a web-based utility. To install UCP, you must have a web server that runs Microsoft IIS 5.0.

This document contains the following sections:

Installing UCP

This section contains information and procedures for installing UCP. It contains the following topics:

Preparing the Web Server

Preparing the web server consists of creating virtual directories on the web server. These virtual directories correspond to the file system directories where the UCP setup program will place HTML files and CGI executable files.

To prepare for UCPs, follow these steps:


Step 1   Make sure the web server uses Microsoft IIS 5.0, which is the Windows 2000 web service.

Step 2   In the file system directory that the web server uses as its home directory, create the following two directories:

  • secure—This directory will contain the HTML files used by UCP. You can use a name different from secure. You will use the name you choose later in Step 3 of this procedure and twice more in Installing UCP Software.
  • securecgi-bin—This directory will contain the executable CGI files used by UCP. You can use a name different from securecgi-bin. You will use the name you choose in Step 4 of this procedure and twice more in Installing UCP Software.

For example, if the home directory of the web server is C:\Inetpub\wwwroot, use My Computer to add the directories to C:\Inetpub\wwwroot.


Tip To determine the home directory, see the properties of the Default Web Site for Microsoft IIS.

Step 3   In Microsoft IIS, add a virtual directory for the HTML files used by UCP. Use the following information when you create the virtual directory:

  • Virtual Directory Alias—A name for the virtual directory, which corresponds to the secure directory created in Step 2. We recommend that you use secure. This alias will be a component in the URL used to access UCP, so a short but descriptive alias could help users remember the URL.
  • Web Site Content Directory—The directory specified must match the secure directory created in Step 2. The default directory from Step 2 is C:\Inetpub\wwwroot\secure.
  • Access Permissions—Give this virtual directory read permissions. No other permissions are necessary.

For information about creating virtual directories, see Microsoft IIS documentation, available at http://www.microsoft.com/windows2000/en/server/iis/.

Step 4   Add a virtual directory for the CGI executable files used by UCP. Use the following information when you create the virtual directory:

  • Virtual Directory Alias—A name for the virtual directory, which corresponds to the securecgi-bin directory created in Step 2. We recommend that you use securecgi-bin.
  • Web Site Content Directory—The directory specified must match the securecgi-bin directory created in Step 2. The default directory from Step 2 is C:\Inetpub\wwwroot\securecgi-bin.
  • Access Permissions—Give this virtual directory read and execute permissions. No other permissions are necessary.

For information about creating virtual directories, see Microsoft IIS documentation, available at http://www.microsoft.com/windows2000/en/server/iis/.





Preparing Cisco Secure ACS for UCP

Preparing for Cisco Secure ACS consists of configuring Cisco Secure ACS to recognize the web server as a type of AAA server. This enables Cisco Secure ACS to recognize and respond to user password changes from UCP on the web server. Without this configuration, Cisco Secure ACS ignores user password change requests from UCP.


Note   If Cisco Secure ACS and Microsoft IIS software run on the same computer, you do not need to perform these steps. Proceed to Secure Socket Layer 5.

To prepare for UCPs, follow these steps:


Step 1   Log in to the Cisco Secure ACS HTML interface of the Cisco Secure ACS that you want UCP to send user password changes to.


Note    If you are using the CiscoSecure Database Replication feature, the Cisco Secure ACS that UCP sends user password changes to should be a primary Cisco Secure ACS; otherwise, if the user database is replicated, user password changes are overwritten by the older information from the primary Cisco Secure ACS.

Step 2   Click Interface Configuration, and then click Advanced Options.

Result: The Advanced Options page appears.

Step 3   Make sure the Distributed Systems Settings check box is selected. This enables the AAA Servers table to appear in the Network Configurations section.

Step 4   Click Submit.

Step 5   Click Network Configuration.

Step 6   If network device groups (NDGs) are enabled, click the NDG that you want to add the UCP web server to.

Step 7   In the AAA Servers table, click Add Entry.

Step 8   In the AAA Server Name box, type the name you want to give to the UCP web server. We recommend using the web server hostname; however, you can include additional useful information, such as "UCP" to readily identify the UCP web server. For example, if the web server hostname is "wwwin", you could type "UCP-wwwin" in the AAA Server Name box.

Step 9   In the AAA Server IP Address box, type the IP address of the UCP web server. Use dotted decimal format.


Note    The other settings on the Add AAA Server page are irrelevant to the proper functioning of UCP.

Step 10   Click Submit + Restart.

Result: Cisco Secure ACS is configured to recognize and respond to password change information from the web server you plan to install UCP on.





Secure Socket Layer

This section contains information about using secure socket layer (SSL) to encrypt communication between a user's web browser and the Microsoft IIS running UCP.


Note   We recommend enabling SSL. If, without exception, every user always accesses UCP from within a secure perimeter, SSL may not be necessary; otherwise, it is a worthwhile precaution to enable SSL so that UCP traffic between a user's web browser and the web server running UCP is encrypted.

About SSL

The SSL protocol provides security for remote access data transfer between the UCP web server and the user's web browser. Because users change their Cisco Secure ACS database passwords over a connection between their web browsers and Microsoft IIS, user and password data is vulnerable. The SSL protocol encrypts data transfers, including passwords, between web browsers and Microsoft IIS.

SSL requires Microsoft IIS to present valid certificate credentials. You must obtain a certificate from a certificate authority. If you use a public certificate authority, the certificate authority assigns your keys for a fee, provided you comply with certain requirements.

Enabling SSL on the Web Server

To enable optional SSL security on the web server, follow these steps:


Step 1   Obtain a certificate from a certificate authority.

Step 2   After you have received your certificate from the certificate authority, install the certificate on your web server. For information about installing a certificate, see Microsoft IIS documentation, available at http://www.microsoft.com/windows2000/en/server/iis/.

Step 3   Following your Microsoft IIS documentation, activate SSL security on the web server.

Keep in mind the following points when enabling SSL security:

  • You can enable SSL security on the root of your web site or on one or more virtual directories.
  • After SSL is enabled and properly configured, only SSL-enabled clients can communicate with the SSL-enabled WWW directories.
  • URLs that point to documents on an SSL-enabled WWW folder must use https instead of http in the URL. Links that use http in the URL do not work on a secure directory.




Installing UCP Software

Before You Begin

Be sure you have completed the steps in these sections:

If you intend to implement SSL, be sure you have read Secure Socket Layer, and completed the procedure it contains.

You will need the Cisco Secure ACS CD to complete this procedure.

To install the User-Changeable Password software, follow these steps:


Step 1   At the web server that you want to install UCP on, log in as the local administrator.

Step 2   Insert the Cisco Secure ACS CD in a CD-ROM or DVD-ROM drive on the web server.

If autorun opens a setup window for Cisco Secure ACS, click Cancel.

Step 3   Use Windows Explorer to open the UCP subdirectory on the Cisco Secure ACS CD.

Step 4   Double-click the UCP SETUP.EXE file.

Result: The Before You Begin dialog box appears.

Step 5   Select the check boxes for all the items, and then click Next.

Result: The Choose Destination Location dialog box displays a default directory for HTML files used by UCP.

Step 6   Specify the full path of the secure directory that you created in Preparing the Web Server. If you chose secure as the directory name and C:\Inetpub\wwwroot is the home directory of the web server, you can accept the default location.

Step 7   Click Next.

Result: A second Choose Destination Location dialog box displays a default directory for the CGI executable files used by UCP.

Step 8   Specify the full path of the securecgi-bin directory that you created in Preparing the Web Server. If you chose securecgi-bin as the directory name and C:\Inetpub\wwwroot is the home directory of the web server, you can accept the default location.

Step 9   Click Next.

Result: The Enter Information dialog box displays the default URL for the HTML virtual directory, using the web server's IP address.

Step 10   Specify the URL for the HTML virtual directory, following these guidelines:

  • If you are not using SSL and you chose to use secure as the virtual directory alias for the UCP HTML directory, you can accept the default value.
  • If you are using SSL, change the beginning of the URL from "http" to "https". The letter s is required after "http"; otherwise, communication between users and UCP will not be SSL-encrypted.
  • If you chose a name different from secure as the virtual directory alias for the UCP HTML directory, change "secure" to the name you chose in Preparing the Web Server.

For example, if you are using SSL and you specified "ucp" as the HTML virtual directory alias, you should change the URL to https://IPAddress/ucp, where IPAddress is the dotted decimal IP address of the web server.

Step 11   Click Next.

Result: A second Enter Information dialog box displays the default URL for the CGI virtual directory, using the web server's IP address.

Step 12   Specify the URL for the CGI virtual directory, following these guidelines:

  • If you are not using SSL and you chose to use securecgi-bin as the virtual directory alias for the UCP CGI directory, you can accept the default value.
  • If you are using SSL, change the beginning of the URL from "http" to "https". The letter s is required after "http"; otherwise, communication between users and UCP will not be SSL-encrypted.
  • If you chose a name different from securecgi-bin as the virtual directory alias for the UCP HTML directory, change "secure" to the name you chose in Preparing the Web Server.

For example, if you are using SSL and you specified "ucpcgi-bin" as the HTML virtual directory alias, you should change the URL to https://IPAddress/ucpcgi-bin, where IPAddress is the dotted decimal IP address of the web server.

Step 13   Click Next.

Result: The Connecting to Cisco Secure Server dialog box appears.

Step 14   Type the IP address of the Cisco Secure ACS that you want UCP to send user password changes to. Use dotted decimal format for the IP address.

Step 15   Click Next.

Result: Setup tests the connection to the Cisco Secure ACS you specified, and then the Setup Complete dialog box appears.

Step 16   To complete the installation, click Finish.

Result: UCP is installed. If the web server is running and accessible, users can change Cisco Secure ACS passwords with UCP. For information about accessing UCP, see Determining the UCP URL.





Determining the UCP URL

After you have successfully installed UCP, you can access UCP with a supported web browser. For a list of supported web browsers, see the Release Notes for the version of Cisco Secure ACS you are accessing. The latest revision to the Release Notes is posted on Cisco.com (http://www.cisco.com).

The URL for the UCP web page is:

http:// webserver/secure/login.htm

where webserver is the hostname or IP address of the web server running UCP and secure is the secure virtual directory alias created in Preparing the Web Server.


Tip For a shorter URL to the UCP page, add login.htm to the default documents on the web server. The URL would then be http:// webserver/secure.

Upgrading UCP

The upgrade process consists of uninstalling the old version of UCP and installing the new version.

To upgrade the User-Changeable Password software, follow these steps:


Step 1   Remove the old version of UCP by performing the steps in Uninstalling UCP.

Step 2   Perform the steps in Uninstalling UCP.

Step 3   Using the version of UCP that you want to upgrade to, perform the steps in Installing UCP.





Uninstalling UCP

To uninstall the User-Changeable Password software, follow these steps:


Step 1   On the computer running UCP, use Control Panel to uninstall Cisco Secure ACS User-Changeable Passwords.

Step 2   In Microsoft IIS, remove the virtual directories created for the UCP HTML and CGI files. The default names of these directories are secure and securecgi-bin; however, you may have customized the directory names when you installed UCP.

Step 3   Make sure that the directories the virtual directories were mapped to are deleted. This should happen automatically as part of Step 1. If not, delete them.

Step 4   In the Cisco Secure ACS HTML interface, delete the AAA server configuration that corresponds to the server that ran UCP. For more information about deleting a AAA server configuration, see the user guide for the version of Cisco Secure ACS that you are using.





Changing Your Password


Note   Check with your system administrator to be sure you have the appropriate permissions to change your password.

To change your password using the web server, follow these steps:


Step 1   Using a web browser, open the UCP page using the URL that your administrator provided.

Step 2   Type your username and password, and then click Submit.

Result: The Change Password page opens. The username you entered on the previous page appears in the Username box.

Step 3   Specify the following information:

  • Current Password—Type your current password.
  • New Password—Type the new password. Your password might need to fulfill certain special requirements, such as minimum length. Check with your system administrator for details.
  • Confirm New Password—Re-type the new password.

Step 4   Click Submit.

Result: Your password is changed.

Step 5   To exit, click Logout.





Related Documentation

We strongly recommend that you read the release notes for the version of Cisco Secure ACS that you use.

The User Guide for Cisco Secure ACS for Windows Server provides explanations for the features included in Cisco Secure ACS and procedures for configuring Cisco Secure ACS. This document is also available in PDF format on the Cisco Secure ACS product CD.

Installation Guide for Cisco Secure ACS for Windows Server provides information to help you install the Cisco Secure ACS for Windows Server software efficiently and correctly.

If you are using Cisco Secure ACS Appliance, you can refer to Installation and Setup Guide for Cisco Secure ACS Appliance to help you install the appliance correctly and perform initial configuration.

Included in the Cisco Secure ACS HTML interface are two sources of information:

  • Online Help contains information for each associated page in the Cisco Secure ACS HTML interface.
  • Online Documentation is a complete copy of the user guide.

You should refer to the documentation that came with your AAA clients for more information about those products. You might also want to consult Cisco Systems' Internetworking Terms and Acronyms publication.

Obtaining Documentation

These sections explain how to obtain documentation from Cisco Systems.

World Wide Web

You can access the most current Cisco documentation on the World Wide Web at this URL:

http://www.cisco.com

Translated documentation is available at this URL:

http://www.cisco.com/public/countries_languages.shtml

Documentation CD-ROM

Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM package, which is shipped with your product. The Documentation CD-ROM is updated monthly and may be more current than printed documentation. The CD-ROM package is available as a single unit or through an annual subscription.

Ordering Documentation

You can order Cisco documentation in these ways:

  • Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Networking Products MarketPlace:

http://www.cisco.com/public/ordsum.html

  • Registered Cisco.com users can order the Documentation CD-ROM through the online Subscription Store:

http://www.cisco.com/go/subscription

  • Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, U.S.A.) at 408 526-7208 or, elsewhere in North America, by calling 800 553-NETS (6387).

Documentation Feedback

You can submit comments electronically on Cisco.com. In the Cisco Documentation home page, click the Fax or Email option in the "Leave Feedback" section at the bottom of the page.

You can e-mail your comments to bug-doc@cisco.com.

You can submit your comments by mail by using the response card behind the front cover of your document or by writing to the following address:

Cisco Systems
Attn: Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883

We appreciate your comments.

Obtaining Technical Assistance

Cisco provides Cisco.com as a starting point for all technical assistance. Customers and partners can obtain online documentation, troubleshooting tips, and sample configurations from online tools by using the Cisco Technical Assistance Center (TAC) Web Site. Cisco.com registered users have complete access to the technical support resources on the Cisco TAC Web Site.

Cisco.com

Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information, networking solutions, services, programs, and resources at any time, from anywhere in the world.

Cisco.com is a highly integrated Internet application and a powerful, easy-to-use tool that provides a broad range of features and services to help you with these tasks:

  • Streamline business processes and improve productivity
  • Resolve technical issues with online support
  • Download and test software packages
  • Order Cisco learning materials and merchandise
  • Register for online skill assessment, training, and certification programs

If you want to obtain customized information and service, you can self-register on Cisco.com. To access Cisco.com, go to this URL:

http://www.cisco.com

Technical Assistance Center

The Cisco Technical Assistance Center (TAC) is available to all customers who need technical assistance with a Cisco product, technology, or solution. Two levels of support are available: the Cisco TAC Web Site and the Cisco TAC Escalation Center.

Cisco TAC inquiries are categorized according to the urgency of the issue:

  • Priority level 4 (P4)—You need information or assistance concerning Cisco product capabilities, product installation, or basic product configuration.
  • Priority level 3 (P3)—Your network performance is degraded. Network functionality is noticeably impaired, but most business operations continue.
  • Priority level 2 (P2)—Your production network is severely degraded, affecting significant aspects of business operations. No workaround is available.
  • Priority level 1 (P1)—Your production network is down, and a critical impact to business operations will occur if service is not restored quickly. No workaround is available.

The Cisco TAC resource that you choose is based on the priority of the problem and the conditions of service contracts, when applicable.

Cisco TAC Web Site

You can use the Cisco TAC Web Site to resolve P3 and P4 issues yourself, saving both cost and time. The site provides around-the-clock access to online tools, knowledge bases, and software. To access the Cisco TAC Web Site, go to this URL:

http://www.cisco.com/tac

All customers, partners, and resellers who have a valid Cisco service contract have complete access to the technical support resources on the Cisco TAC Web Site. The Cisco TAC Web Site requires a Cisco.com login ID and password. If you have a valid service contract but do not have a login ID or password, go to this URL to register:

http://www.cisco.com/register/

If you are a Cisco.com registered user, and you cannot resolve your technical issues by using the Cisco TAC Web Site, you can open a case online by using the TAC Case Open tool at this URL:

http://www.cisco.com/tac/caseopen

If you have Internet access, we recommend that you open P3 and P4 cases through the Cisco TAC Web Site.

Cisco TAC Escalation Center

The Cisco TAC Escalation Center addresses priority level 1 or priority level 2 issues. These classifications are assigned when severe network degradation significantly impacts business operations. When you contact the TAC Escalation Center with a P1 or P2 problem, a Cisco TAC engineer automatically opens a case.

To obtain a directory of toll-free Cisco TAC telephone numbers for your country, go to this URL:

http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml

Before calling, please check with your network operations center to determine the level of Cisco support services to which your company is entitled: for example, SMARTnet, SMARTnet Onsite, or Network Supported Accounts (NSA). When you call the center, please have available your service agreement number and your product serial number.

This document is to be used in conjunction with the documents listed in the "Related Documentation" section.

Copyright © 2002, Cisco Systems, Inc.
All rights reserved.