![]() ![]() It is mandatory to use the two strings, Username and Groups, exactly as shown above. Save to a file, for example, signing.cer and upload. Format the signature certificate using as done above. ![]() ![]() You should see theĬertificate information after uploading to Okta. Mozilla Firefox may not allow you to do the upload. Make sure to remove the last empty line and then save the output ( X.509.cert with header) into a text file encryption.cer. Go to and click on X.509 CERTS, paste there. The value can be an IP address or the name of the vManage site.įor Application username, select Okta username.įor Show Advanced Settings, enter the fields as indicated below.Ĭopy the encryption certificate from the metadata you downloaded. Check the box Use this for Recipient URL and Destination URL.Ĭopy the entityID string and paste it in the Audience URI (SP Entity ID) field. On SAML Settings for Single sign on URL section, set the value to the samlLoginResponse URL from the downloaded metadata from the vManage UI. Optional: Upload a logo, and then click Next. Select Web for the platform, and select SAML 2.0 as the Sign on Method. If it shows the Developer Console, click on the down triangle to select the Classic UI.Ĭlick on Add Application under Shortcuts to the right to go to the next page, and then click on Create New Application on the pop-up window. Then check the upper left corner to make sure it shows the Classic UI view on Okta. To add vManage as one SSO application, click on the Admin button on the upper right corner to go to the next page. In the metadata, note the following information that you will use to configure Okta with vManage:Ĭreate a username using your email address. This data will be used for configuring Okta. In vManage, click Administration > Settings > Identify Provider Settings > Edit.Ĭlick Click here to download the SAML metadata and save the content in a file. To configure Okta SSO, you must use vManage to enable an identity provider and generate a SAML metadata file: Perform the following steps to configure SSO. Okta provides a secure identity management service that lets you connect any person with any application on any device using Configure SSO for Active Directory Federation Services (ADFS).Cisco SD-WAN supports single sign-on using Okta or Active Directory Federation Services (ADFS). This chapter describes how to configure single sign-on for Cisco SD-WAN. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |