Print

Previous Topic

Next Topic

Single sign-on configuration in Cisco WebEx Messenger Administration Tool

The Cisco WebEx Administration Tool allows the Organization Administrator to configure Single sign-on settings and modify the security setting and certificates for your Cisco WebEx Organization. Options are displayed based on organization settings set by the Administrator. Not all options will be displayed at all times.

  • Select Federated Web SSO Configuration to display the dialog for an administrator whose organization has turned on single sign-on. more...
  • Select Organization Certificate Management to display the dialog for an administrator whose organization has turned on single sign-on or is a “Delegated Authentication” administrator. more...
  • Select WebEx Certificate Management to display the dialog for an administrator whose organization has turned on single sign-on. more...
  • Select Partner Web SSO Configuration to display the dialog for an administrator whose organization is “Delegated Authentication”. more...

You can also set SAML 2.0 configurations. Attributes are displayed in the following table:

Attribute

Required (Yes/No)

Usage

uid

Yes

 

firstname

Yes

 

lastname

Yes

 

email

Yes

 

groupid

No

Supports only create, not update

updateTimeStamp

No, but recommended

Supports long value, UTC time format, & LDIF time format

displayName

No

 

companyName

No

 

businessFax

No

 

streetLine1

No

 

streetLine2

No

 

city

No

 

state

No

 

zipcode

No

 

jobTitle

No

 

mobilePhone

No

 

businessPhone

No

 

employeeid

No

 

imloggingenabled

No

When an organization has IMLogging enabled, and if no such attribute exists, it would be set to false.

imloggingendpointname

No

When an organization has IMLogging enabled, and if no such attribute exists, it would be set to wbx_default_endpoint.

ISOCountry

No

2-letter ISO country code

upgrade site

No

If there is a not-null ‘upgradesite’ attribute, the action will correspond with the (enabled/disabled) auto account creation and auto account update features.

If the ‘upgradesite’ attribute is not provided or the value is empty, no action is required.

 

Note:

  • The user can be created using the single sign-on process, but the administrator privilege needs be manually assigned in the Administration console.
  • All settings must match the configuration in IdP.

To configure single sign-on authentication:

  1. Sign in to the Cisco WebEx Messenger Administration Tool.
  2. Select the Configuration tab to display the System Settings options.
  3. Select Security Settings.

     

     

     

    Note: The Allow Connect account username and password login via CAS API checkbox is selected in a transition phase when an organization is moving their authentication mechanism from "username/password store in the cloud" to SSO with an IdP. It allows the organization to move gradually over to SSO.

Top of Page   Print