Guides
ProductDeveloperPartnerPersonal

Enable Cisco SecureX Sign-On

Cisco SecureX sign-on enables you to sign into your Cisco products with one set of credentials. For more information, see the Cisco SecureX Sign-On Quick Start Guide.

Prerequisites

  • Full admin access to the Umbrella dashboard. See Manage User Roles.
  • All users must have a Cisco SecureX Sign-On account.

📘

All Users Must Have a Cisco SecureX Sign-On Account

Enabling Cisco SecureX Sign-On as a SAML provider requires a Cisco SecureX Sign-On account assigned to your Umbrella application. Any user without an account cannot authenticate to the Umbrella dashboard.

Procedure

  1. Navigate to Admin > Authentication.
1200
  1. In the SAML Dashboard User Configuration section, click Enable SAML.
818
  1. Select Cisco Secure Sign-On and click Next.
1325
  1. Click Cisco SecureX Sign-On to create a Cisco SecureX Sign-On account. On the following window, click Sign up. For more information about creating this account, see Cisco SecureX Sign-On Quick Start Guide.
340
  1. Once an account is created, return to step 2 of the configuration in Umbrella. Click Test Configuration.
1485
  1. Sign in with the credentials provided when you created the Cisco Secure Sign-In account.
425
  1. Once the authentication is complete, a success modal appears.
634
  1. Dismiss the modal and return to step 2 of the configuration in Umbrella. If the configuration is complete, a success message appears.
757

🚧

Test Configuration

The Test Configuration must be performed and successful for the set-up to complete.

  1. Click Next. The third step of the configuration appears informing you that:
  • This single sign-on service will be required going forward.
  • Umbrella will send an email to all dashboard users (not end-users) and a message to all admins in the dashboard to inform them of the mandatory SSO and that passwords are no longer accepted.
  • If the SSO is disabled in the future, all users will be emailed a link to reset their passwords, as old passwords will not be accepted.
  • Block page bypass users will no longer function once SAML is enabled.
  1. Check both boxes to acknowledge the information, and click Save and Notify Users. Both boxes must be checked before saving the configuration.
779

Cisco Secure Sign-On is now enabled in your org. All users receive an email informing them of the required SSO.

507

Enable Two-Step Verification < Enable Cisco SecureX Sign-On> Disable Cisco SecureX Sign-On