webex-logowebex-logoHelp Center
  • Ctrl K
    • Get started
    • Help by product
    • Administration
    • What's new
    • Support

      Join a meeting
      Developer ToolsDeveloper Tools
      Webex AdoptionWebex Adoption
      Contact Support

      learn

      Video resources
      Webex AcademyWebex Academy
      Live Events and WebinarsLive Events and Webinars
      Webex BlogWebex Blog

      programs

      Webex CommunityWebex Community
      Webex InsiderWebex Insider
      App HubApp Hub
      Cisco AI Assistant

      Cisco AI Assistant

      The most advanced generative AI-powered platform for hybrid work and customer experience.

      Learn more →
      webexDownload Webex
      +1-888-469-3239Contact Sales →
    • Ctrl K
      • Dansk
      • Deutsch
      • English language tick
      • Español
      • Français
      • Italiano
      • Nederlands
      • Português
      • Pyccĸий
      • Svenska
      • Tϋrkçe
      • 한국어
      • 日本語
      • 简体中文
      • 繁體中文
      • Română
      • Magyar
      • Polski
      • Čeština
      • Български
      • Norsk
      • Hrvatski
      • Srpski
      • Українська
      • العربية
      • עברית
      • Suomi
      • Slovenščina
      • Slovenský
    • Home
    • /
    • Article
    Was this article helpful?
    close

    Thanks for your feedback.

    October 04, 2024 | 217 view(s) | 0 people thought this was helpful
    How Do I Decrypt a Webex SSO SAML Assertion?
    list-menuFeedback?

    Suppose you're troubleshooting a single sign-on deployment and authentication has failed. In that case, you can leverage your Identity Provider logging or the service provider (Webex) application error for possible clues to remediate the problem.

    When you expect your Identity Provider to pass the correct details in the SAML assertion yet authentication is still failing, you may need to inspect the content in the SAML assertion with a tool like SAML Tracer. If the SAML assertion you inspect is encrypted, you may configure the Identity Provider to decrypt the assertions. This allows you to explicitly identify the attributes and values passed to Webex. Each Identity Provider has different ways to handle the control of encrypted SAML assertions and you must follow the vendor documentation for the required steps to decrypt them.

     

    Since Active Directory Federation Service (ADFS) is a widely used Identity Provider within Webex deployments, we've documented the steps to temporarily disable encryption for SAML assertions used for the Webex application on an ADFS server.

     

    Follow these steps to do so:

    1. Log in to your Active Directory Federation Service (ADFS).
    2. Launch Windows PowerShell.
    3. Enter the following command to decrypt SAML assertions for the Webex application (replace %ORG_ID% with your actual Webex organization ID): Set-ADFSRelyingPartyTrust -TargetIdentifier https://idbroker.webex.com/%ORG_ID% -EncryptClaims $False.
    4. Reproduce the authentication issue and capture a SAML tracer.
    5. Re-enable encryption by entering the same command in step 3 but changing the -EncryptClaims $True flag.

     

    Note: The TargetIdentifier value can be obtained from the Webex metadata file downloaded from Control Hub. The TargetIdentifier value maps to the entityID value that is found on the first line of the Webex metadata file.

     

    Was this article helpful?
    Was this article helpful?
    PricingWebex AppMeetingsCallingMessagingScreen Sharing
    Webex SuiteCallingMeetingsMessagingSlidoWebinarsEventsContact CenterCPaaSSecurityControl Hub
    HeadsetsCamerasDesk SeriesRoom SeriesBoard SeriesPhone SeriesAccessories
    EducationHealthcareGovernmentFinanceSports & EntertainmentFrontlineNonprofitsStartupsHybrid Work
    DownloadsJoin a Test MeetingOnline ClassesIntegrationsAccessibilityInclusivityLive & On-Demand WebinarsWebex CommunityWebex DevelopersNews & Innovations
    CiscoContact SupportContact SalesWebex BlogWebex Thought LeadershipWebex Merch StoreCareers
    • X
    • LinkedIn
    • Facebook
    • Youtube
    • Instagram
    Terms & ConditionsPrivacy StatementCookiesTrademarks
    ©2026 Cisco and/or its affiliates. All rights reserved.
    Terms & ConditionsPrivacy StatementCookiesTrademarks