How Do I Configure Microsoft Azure Active Directory Integration with Cisco Webex Through Site Administration?
How do I configure Microsoft Azure active directory integration with Cisco Webex through Site Administration?
How do I configure Microsoft Azure active directory integration with my Webex site through Cisco Webex Site Administration?
Solution:
Configuration of Microsoft Azure Active Directory (AD) integration through Cisco Webex Site Administration requires the following steps to be performed:
Adding Cisco Webex Meetings from the gallery:
- In the Azure portal, click the Azure Active Directory icon in the left pane.
- Go to Enterprise Applications > All Applications.
- To add a new application, select New application.
- In the Add from the gallery section, type Cisco Webex Meetings in the search box.
- Select Cisco Webex Meetings from the results pane, then click the Add button to add the application.
- On the Cisco Webex Meetings application integration page, find the Manage section and select single sign-on.
- On the Select a single sign-on method page, select SAML.
- On the Set up Single Sign-On with SAML page, to configure the application in the IDP initiated mode by uploading the Service Provider metadata file:
- Once the Service Provider metadata file is successfully uploaded, the Identifier and Reply URL values auto populate in the Basic SAML Configuration section.
- Select Upload.
- Click Upload metadata file, then click on the folder logo to select the metadata file.
- If you wish to configure the application in SP initiated mode, follow these steps:
- In the Basic SAML Configuration section, click on the Edit icon.
- Enter the site URL In the Sign on URL box. (Example: https://SITENAME.webex.com)
- Cisco Webex Meetings application requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click the Edit icon to open the User Attributes dialog:
- In addition, the Cisco Webex Meetings application requires a few more attributes to be passed back in the SAML response. In the User Claims section on the User Attributes dialog, add the SAML token attribute as shown in the below table:
Follow these steps to add the SAML token attribute:
- Click Add new claim to open the Manage user claims dialog.
- In the Name box, type the attribute name.
- Leave the Namespace blank.
- Select the Source as Attribute.
- From the Source attribute list, select the attribute value for that row from the drop-down list.
- Select Save.
- On the Set up Single Sign-On with SAML page, in the SAML Signing Certificate section, find Federation Metadata XML and select Download to save the certificate on your computer.
- On the Set up Cisco Webex Meetings section, copy the appropriate URL(s) based on your requirement.
- In the Azure portal, select Enterprise Applications, and then select All applications.
- In the Applications list, select Cisco Webex Meetings.
- In the App's overview page, find the Manage section and select Users and groups.
- Select Add user, then select Users and groups in the Add Assignment dialog.
- In the Users and groups dialog, select the user from the Users list, then click the Select button.
- If you require role value in the SAML assertion, select the appropriate role for the user from the list in the Select Role dialog.
- Scroll down to the bottom of the screen, then click Select.
- In the Add Assignment dialog, click the Assign button.
- Log in to the Cisco Webex Site Administration.
- Go to Common Site Settings > SSO Configuration.
- On the Webex Administration page, select SAML 2.0 as the Federation Protocol.
- Click on the Import SAML Metadata link to upload the metadata file.
- Click Export to download the Service Provider Metadata file, and then upload it in the Basic SAML Configuration section in the Azure portal.
- In the AuthContextClassRef field, type urn:oasis:names:tc:SAML:2.0:ac:classes:Password.
- Select Auto Account Creation, then click Save.
Was this article helpful?