SAML Auto Account Creation and Update for Control Hub
Modify Single sign-on authentication in Control Hub
Before you begin
Ensure that the following preconditions are met:
-
SSO is already configured. For information on using the SSO configuration wizard, see the section "SSO Setup" here: https://help.webex.com/article/lfu88u/.
-
The domains have already been verified.
-
The domains are claimed and turned on. This feature ensures users from your domain are created and updated once each time they authenticate with your IdP.
-
If DirSync or AzureAD are enabled then SAML JIT create or update will not work.
-
"Block user profile update" is enabled. SAML Update Mapping is allowed because this configuration controls the user’s ability to edit the attributes. Admin-controlled methods of creation and update are still supported.
Newly created users won't automatically get assigned licenses unless the organization has an automatic license template set up.
User provisioning for SAML JIT provisioning of groups is limited to a single group only.
1 |
Sign in to Control Hub. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2 |
Go to Single Sign-On and click Manage SSO and IdPs. , scroll to | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3 |
Go to the Identity provider tab. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
4 |
Go to the IdP and click . | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
5 |
Select Edit SAML mapping. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
6 |
Configure Just-in-Time (JIT) settings.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7 |
Configure SAML mapping required attributes.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8 |
Configure the Linking attributes. This should be unique to the user. It is used to lookup a user so that Webex can
update all profile attributes, including email for a user.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9 |
Configure Profile attributes.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10 |
Configure Extension attributes. Map these attributes to extended attributes in Active Directory, Azure, or your
directory, for tracking codes.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11 |
Configure Group attributes.
If user A is associated with SAML JIT provisioning does not support the removal of users from groups or any deletion of users.
For a list of SAML assertion attributes for Webex Meetings, see https://help.webex.com/article/WBX67566. |