Update Cisco Webex Relying Party Trust in AD FS

This task is specifically about updating AD FS with new SAML metadata from Cisco Webex. There are related articles if you need to configure SSO with AD FS, or if you need to update (a different) IdP with SAML Metadata for a New Webex SSO Certificate.

Before you begin

You need to export the SAML metadata file from Control Hub before you can update the Cisco Webex Relying Party Trust in AD FS.


Sign in to the AD FS server with administrator permissions.


Upload the SAML metadata file from Webex to a temporary local folder on the AD FS server, eg. //ADFS_servername/temp/idb-meta-<org-ID>-SP.xml.


Open Powershell.


Run Get-AdfsRelyingPartyTrust to read all relying party trusts.

Note the TargetName parameter of the Cisco Webex relying party trust. We use the example "Cisco Webex" but it could be different in your AD FS.


Run Update-AdfsRelyingPartyTrust -MetadataFile "//ADFS_servername/temp/idb-meta-<org-ID>-SP.xml" -TargetName "Cisco Webex".

Make sure to replace the file name and target name with the correct values from your environment.

See https://docs.microsoft.com/powershell/module/adfs/update-adfsrelyingpartytrust.

Sign in to Control Hub, then test the SSO integration:

  1. Go to Settings, scroll to Authentication, click Modify.

  2. Select Integrate a third-party identity provider (Advanced) and click Next.

  3. Click Next to skip the Import IdP Metadata page.

    You don't need to repeat that step, because you previously imported the IdP metadata.

  4. Click Test SSO Connection.

    A new browser window opens, redirects you to the IdP challenge page.

  5. Sign in to complete the test.