Guides
ProductDeveloperPartnerPersonal

Enable Cisco SecureX Sign-On

Cisco SecureX sign-on enables you to sign into your Cisco products with one set of credentials. For more information, see the Cisco SecureX Sign-On Quick Start Guide.

Prerequisites

  • Full admin access to the Umbrella dashboard. See Manage User Roles.
  • All users must have a Cisco SecureX Sign-On account.

🚧

All Users Must Have a Cisco SecureX Sign-On Account

Enabling Cisco SecureX Sign-On as a SAML provider requires a Cisco SecureX Sign-On account assigned to your Umbrella application. Any users without an account will not be able to authenticate to the Umbrella dashboard.

Procedure

  1. Navigate to Admin > Authentication.
1200
  1. In the SAML Dashboard User Configuration section, click Enable SAML.
818
  1. Select Cisco SecureX Sign-On and click Next.
1044
  1. Click Cisco SecureX Sign-On to create a Cisco SecureX Sign-On account and on the following window click Sign up. For more information about creating this account, see Cisco SecureX Sign-On Quickstart Guide.
340
  1. Once an account is created, return to step 2 of the configuration in Umbrella. Click Test Configuration.
1485
  1. Sign in with the credentials provided when you created the Cisco SecureX Sign-In account.
425
  1. Once the authentication is complete, a success modal appears:
634
  1. Dismiss the modal and return to step 2 of the configuration in Umbrella. If the configuration is complete, a success message appears.
757

🚧

Test Configuration

The Test Configuration must be performed and successful for the set-up to complete.

  1. Click Next. The third step of the configuration appears informing you:
  • This single sign-on service will now be required going forward.
  • Umbrella will send an email to all dashboard users (not end-users) and a message to all admins in the dashboard to inform them of the mandatory SSO and that passwords are no longer accepted.
  • If the SSO is disabled in the future all users will be emailed a link to reset their passwords as old passwords will not be accepted.
  • Block page bypass users will no longer function once SAML is enabled.
  1. Check both boxes to acknowledge the information and click Save and Notify Users. Both boxes are required to be checked before saving the configuration.
779

Cisco SecureX Sign-On is now enabled in your org. All users receive an email informing them of the required SSO.

507

Disable Two-Step Verification < Enable Cisco SecureX Sign-On > Disable Cisco SecureX Sign-On