Step 1 – Configure Network Connections

The Get Started with Cisco Secure Access workflow guides you through the tasks in the Configure Infrastructure step—configure Resource Connector Groups and Resource Connectors, and configure Network Tunnel Groups and establish network tunnels to Secure Access. Once you complete the network connections deployment steps, provision users and groups from your organization in Secure Access and configure integrations with SAML identity providers (IdPs). For more information, see Manage Network Connections.

Table of Contents

Prerequisites

Task 1 – Add Network Connections

Add Network Tunnel Groups

Add Network Tunnel Groups to your organization and deploy and manage IPsec tunnels. A deployed IPsec tunnel supports connections over a virtual private network (VPN) to resources on the network, or connections secured by Zero Trust Network Access (ZTNA) to the private resources on the network.

Add Resource Connectors and Connector Groups

Add Resource Connector Groups to your organization where a connector group includes at least two Resource Connectors. A Resource Connector Group supports remote network connections using Zero Trust Network Access (ZTNA) to private resources running in private clouds or on-premises data centers.

Task 2 – Provision Users and Groups

Provision users and groups from your organization in Secure Access. You can configure users and groups though integrations with identity providers (IdPs) or by manually importing a list of users and groups from a comma-separated values (CSV) file. Once you provision users, you can configure and manage users in profiles that secure and route traffic from user devices. For more information, see Manage Users and Groups.

Task 3 – Configure Integrations with SAML Identity Providers

Integrate SAML identity providers (IdPs) and users in your organization in Secure Access. For more information, see Configure Integrations with SAML Identity Providers.

What's Next


Begin Secure Access Onboarding Workflow < Step 1 – Configure Network Connections > Step 2 – Configure Access to Resources