Previous Topic

Next Topic

Single sign-on requirements

The following system requirements are required to implement federated single sign-on for your Cisco WebEx organization. These system requirements are the same for Cisco WebEx Messenger and the Cisco WebEx Meeting applications.




Identity and Access Management (IAM) system

Any IAM that conforms to SAML versions (for Cisco WebEx Meeting only) 2.0 or WS-Federation 1.0 standard.

Customers can develop their own SAML-compliant IAM system using programming libraries such as OpenSAML or purchase commercial third party IAM systems such as Ping Federate, CA SiteMinder, Microsoft Windows Server ADFS, Oracle Identity Federation/OpenSSO, Novell Identity Manager and IBM Tivoli Federated Identity Manager.

X509 Certificate has public key, digitally sign uses private key

From trusted organizations like VeriSign and Thawte in the PEM format.

Alternatively, customers can serve their own X.509 certificates developed in house using self-signed certificates.

The following items are also required:

  • a standard SAML 2.0 or WS Federate 1.0 compliant IAM.
  • a corporate X.509 public key certificate. SAML assertions sent to the Cisco WebEx system are signed with the private key.
  • a Cisco WebEx supported Identity and Access Management system (IAM) for tasks such as enabling single sign-on, authentication management, policy-based authorization, and identity federation. Supported systems include CA SiteMinder, ADFS, Ping Identity, SAML 2.0 or any WS-Federation 1.0-compliant Identity Management System.
  • IAM configured to provide a SAML assertion with the user account information and SAML system IDs required by Cisco WebEx.
  • URL for the corporate IAM service to be entered in Cisco WebEx Administration tool.
Top of Page   Print