Quickstart – Cisco Secure Client with Zero Trust Access

The Cisco Secure Client with Zero Trust Access connects user devices securely to private resources in on-premises data centers managed by your organization and resources in private and public clouds. Cisco Secure Access Zero supports visibility into user and device identities, network connectivity, and security posture.

User devices must have the Cisco Secure Client with Zero Trust Access deployed and configure a Secure Access Zero Trust Access endpoint posture profile. Users are members of the organization who manages their devices. An administrator must configure the Zero Trust Access endpoint posture profiles in Secure Access and apply a policy rule that includes the Zero Trust Access profiles to the user devices.

The procedure to start onboarding user devices in an organization with the Secure Client and Zero Trust Access should take no more than ten minutes.

Table of Contents

Prerequisites

Procedure

  1. Deploy network connectors in Secure Access.
  2. Provision users and groups in Secure Access. For more information, see Manage Users and Groups.
  3. Configure SAML integrations with identity providers (IdPs). For more information, see Configure Integrations with SAML Identity Providers.
  4. Create Zero Trust (ZT) posture profiles for the user devices in the organization. For more information, see Manage Zero Trust Access Posture Profile.
  5. Create a policy rule or add an ZT posture profile to an existing Secure Access rule. For more information, see Add Access Rules.
  6. Deploy Cisco Secure Client with Zero Trust on user devices.

Test Your Connectivity

  • Check that you can reach private resources protected by Secure Access.

Quickstarts< Quickstart – Cisco Secure Client with Zero Trust > Quickstart – Cisco Secure Client with Virtual Private Network