Step 1 – Configure Network Connections
The Get Started with Cisco Secure Access workflow guides you through the tasks in the Configure Infrastructure step—configure Resource Connector Groups and Resource Connectors, and configure Network Tunnel Groups and establish network tunnels to Secure Access. Once you complete the network connections deployment steps, provision users and groups from your organization in Secure Access and configure integrations with SAML identity providers (IdPs). For more information, see Manage Network Connections.
Table of Contents
- Prerequisites
- Task 1 – Add Network Connections
- Task 2 – Provision Users and Groups
- Task 3 – Configure Integrations with SAML Identity Providers
- What's Next
Prerequisites
- Full Admin user role. For more information, see Manage Accounts.
Task 1 – Add Network Connections
Add Network Tunnel Groups
Add Network Tunnel Groups to your organization and deploy and manage IPsec tunnels. A deployed IPsec tunnel supports connections over a virtual private network (VPN) to resources on the network, or connections secured by Zero Trust Network Access (ZTNA) to the private resources on the network.
Add Resource Connectors and Connector Groups
Add Resource Connector Groups to your organization where a connector group includes at least two Resource Connectors. A Resource Connector Group supports remote network connections using Zero Trust Network Access (ZTNA) to private resources running in private clouds or on-premises data centers.
Task 2 – Provision Users and Groups
Provision users and groups from your organization in Secure Access. You can configure users and groups though integrations with identity providers (IdPs) or by manually importing a list of users and groups from a comma-separated values (CSV) file. Once you provision users, you can configure and manage users in profiles that secure and route traffic from user devices. For more information, see Manage Users and Groups.
- Import Users and Groups from CSV File
- Provision Users and Groups from Okta
- Provision Users and Groups from Azure
- Provision Users and Groups from Active Directory
Task 3 – Configure Integrations with SAML Identity Providers
Integrate SAML identity providers (IdPs) and users in your organization in Secure Access. For more information, see Configure Integrations with SAML Identity Providers.
- Configure Azure AD for SAML
- Configure Okta for SAML
- Configure AD FS for SAML
- Configure Duo Security for SAML
- Configure PingID for SAML
- Configure OpenAM for SAML
What's Next
Begin Secure Access Onboarding Workflow < Step 1 – Configure Network Connections > Step 2 – Configure Access to Resources
Updated 7 months ago