Begin Secure Access Onboarding Workflow
The Get Started with Cisco Secure Access workflow guides you through the initial setup of Secure Access.
Sign in to Secure Access and navigate to Workflows. The first step in the Get Started workflow takes you through the setup of your organization's network connections—network tunnel groups and network tunnels. At the same time, you can provision users and groups from your organization in Secure Access and set up integrations with Security Assertion Markup Language (SAML) identity providers (IdPs).
After you establish network connections, begin the Secure resources and access step in the workflow that includes:
- designing endpoint posture profiles
- IPS and security profiles
- policy rules
Then, in the Configure end user connectivity step, define traffic patterns for remote user connections to resources—configure DNS servers, Zero Trust, virtual private networks (VPNs), and internet security settings.
As an administrator, review and audit connections and traffic events in the Secure Access logs and reports. Start with the Secure Access Overview. For more information, see Secure Access Overview.
- Step 1 – Configure Network Connections
- Step 2 – Configure Access to Resources
- Step 3 – Configure End User Connectivity
- Step 4 – Configure Endpoints and Network Sources
Get Started < Begin Secure Access Onboarding Workflow > Step 1 – Configure Network Connections
Updated 4 months ago