Jump to Content
Cisco Secure Access Help
Guides
Secure Access Help CenterCisco Secure Access Help
Guides
Secure Access Help Center
Guides

Cisco Secure Access Help

  • Welcome to Cisco Secure Access
    • Sign into Secure Access with Security Cloud Sign On
    • Find Your Organization ID
    • Determine Your Current Package
    • View Cloud Security Service Status
    • Contact Cisco Secure Access Support
  • Secure Access Single Sign-On Authentication
    • Configure Single Sign-On Authentication
    • Troubleshoot Single Sign On Authentication
  • Get Started
    • Begin Secure Access Onboarding Workflow
    • Step 1 – Configure Network Connections
    • Step 2 – Configure Access to Resources
    • Step 3 - Configure End User Connectivity
    • Step 4 – Configure Endpoints and Network Sources
    • Secure Access Overview Dashboard
  • Quickstarts
    • Quickstart – Cisco Secure Client with Zero Trust Access
    • Quickstart – Cisco Secure Client with Virtual Private Network
    • Quickstart – Cisco Secure Client with Internet Security
    • Quickstart – Browser with SAML Authentication
    • Quickstart – Bring Your Own Device with Zero Trust
  • Limitations and Range Limits
  • Network Requirements for Secure Access
  • Secure Access NAT as a Service
    • Reserved IP
    • Reserved IP Supplemental Terms
  • Manage Network Connections
    • Comparison of Network Connection Methods
  • Manage Network Tunnel Groups
    • Device Compatibility and Network Tunnels
    • Add a Network Tunnel Group
    • Delete a Network Tunnel Group
    • Edit a Network Tunnel Group
    • View Network Tunnel Group Details
    • Supported IPsec Parameters
  • Network Tunnel Configuration
    • Routing Options and Guidelines
      • Static Routing
      • Dynamic Routing Using BGP
    • Configure Tunnels with Cisco Catalyst SD-WAN
    • Configure Tunnels with Cisco ISR
    • Configure Tunnels with Cisco Adaptive Security Appliance
    • Configure Tunnels with Cisco Secure Firewall
    • Configure Tunnels with Meraki MX
    • Configure Tunnels with NEC IX2000 Series Router
  • Manage Resource Connectors and Connector Groups
    • Requirements and Prerequisites for Resource Connectors and Connector Groups
    • Allow Resource Connector Traffic to Secure Access
    • Add Resource Connector Groups
    • Add Connectors to a Connector Group
    • Obtain the Connector Image
    • Provisioning Keys for Resource Connectors
    • Deploy a Connector in VMware
    • Deploy a Connector in AWS
    • Deploy a Connector in Azure
    • Deploy a Connector in Docker
    • Determine the Number of Connectors Needed in a Connector Group
    • Assign Private Resources to a Connector Group
    • View a Connector Group's Connectors and Assigned Resources
    • Edit a Resource Connector Group
    • Disable, Revoke, or Delete Resource Connectors and Groups
    • Maintain and Monitor Resource Connectors and Connector Groups
    • Troubleshoot Resource Connectors and Connector Groups
  • Secure Access Regions
  • Manage Users, Groups, and Endpoints Devices
    • View User Details
    • View Group and Organizational Unit Details
    • View Endpoint Device Details
    • Unenroll Devices for Client-Based Zero Trust Access
    • Disconnect Remote Access VPN Sessions
  • Manage User Directories and Device Management
    • Configure User Directory Integrations
    • Manage Cloud Identity Providers
      • Add a Cloud Identity Provider
      • Edit an Identity Provider Integration
      • Delete an Identity Provider Integration
    • Import Users and Groups from CSV File
    • Manage Active Directory Integration
    • Manage Google Workspace Account
    • Manage Imported Users and Groups
  • Manage Advanced Configuration Settings
    • Manage IP Surrogates for User Authentication
  • Configure Identity Providers
    • Provision Users and Groups from Okta
    • Provision Users and Groups from Microsoft Entra ID
  • Provision Users, Groups, and Endpoint Devices from Active Directory
    • Prerequisites for AD Connectors
    • Connect Multiple Active Directory Domains
    • Manage AD Components
      • Add AD Components in Secure Access
      • Manage Sites for AD Components
      • View AD Components in Secure Access
      • Delete AD Components
    • Manage AD Connectors
      • Configure Authentication for AD Connectors and VAs
      • Configure Updates on AD Connectors
      • Connect Active Directory to Secure Access
      • Deploy LDIF Files for AD Connector
      • Change the Connector Account Password
      • AD Connector Communication Flow and Troubleshooting
    • AD Integration with Virtual Appliances
      • Prerequisites for AD Connectors and VAs
      • Prepare Your AD Environment
      • Connect Active Directory to VAs
      • Multiple AD Domains with Secure Access Sites
  • Manage User Authentication Profiles
    • Add SSO Authentication Profiles
    • About Single Sign-On for Users
    • Edit an SSO Authentication Profile
    • Delete SSO Authentication Profile
  • Configure Integrations with OIDC Identity Providers
    • Configure Okta for OpenID Connect
    • Configure Microsoft Entra ID for OpenID Connect
  • Configure Integrations with SAML Identity Providers
    • Prerequisites for SAML Authentication
    • Configure Microsoft Entra ID for SAML
    • Configure Okta for SAML
    • Configure AD FS for SAML
    • Configure Duo Security for SAML
    • Configure Ping Identity for SAML
    • Configure OpenAM for SAML
    • SAML Certificate Renewal Options
    • Test SAML Identity Provider Integration
  • Manage End-User Connectivity
  • FQDNs for Network Connections
  • Manage DNS and DDNS Servers
    • Manage DNS Servers
    • Map DNS Servers to Regions
    • Manage DDNS Servers
    • Map DDNS Servers to Regions
  • Manage Virtual Private Networks
    • Manage Regions and IP Pools
    • Add an IP Pool
    • Assign and Modify IP Pools
    • Manage RADIUS Servers and Groups
    • Manage VPN Profiles
    • Add VPN Profiles
    • Add a RADIUS Group
    • Manage Machine Tunnels
      • Machine Tunnel - What to do Next
      • Authenticate Device Identity with Active Directory
      • Provision a Machine Tunnel User
    • Manage Application-Based Remote Access VPN (Per App VPN)
    • Manage Custom Attributes
      • Define Custom Attributes
    • Manage Secure Client Scripts
  • Traffic Steering for Zero Trust Access Client-Based Connections
    • Using Wildcards to Configure Traffic Steering for Private Destinations
  • Manage Internet Security
    • Set Up Internet Security on User Devices
    • Manage Internet Security Bypass
      • Add Destinations for Internet Security Bypass
      • Edit Destination for Internet Security Bypass
      • Delete Destination for Internet Security Bypass
    • Configure Cisco Secure Client Settings
  • Manage PAC Files
    • Deploy the Secure Access PAC File for Windows
    • Deploy the Secure Access PAC File for macOS
    • Customize the Secure Access PAC File
    • Upload Custom PAC Files to Secure Access
  • Manage Proxy Chaining
    • Forwarded-For (XFF) Configuration
  • Manage Registered Networks
    • Add Network Resources
    • Point Your DNS to Cisco Secure Access
    • Clear Your DNS Cache
    • Update a Network Resource
    • Delete a Network Resource
  • Manage Internal Networks
    • Add Internal Network Resources
    • Update an Internal Network Resource
    • Delete an Internal Network Resource
  • Manage Sites
  • Manage Destination Lists
    • Add a Destination List
    • Upload Destinations From a File
    • Edit a Destination List
    • Download Destinations to a CSV File
    • Control Access to Custom URLs
    • Wildcards in Destination Lists
    • Troubleshoot Destination Lists
  • Manage AAA Servers
  • Manage Internet and SaaS Resources
  • Manage Application Lists
    • Add an Application List
    • Application Categories
    • Delete an Application List
  • Manage Content Category Lists
    • Available Content Categories
    • Add a Content Category List
    • Request a Category for an Uncategorized Destination
    • Dispute a Content Category
    • View Content Categories in Reports
  • Manage Tenant Control Profiles
    • Add a Tenant Controls Profile
    • Control Cloud Access to Microsoft 365
    • Control Cloud Access to Google G Suite
    • Control Cloud Access to Slack
    • Control Cloud Access to Dropbox
    • Control Cloud Access to YouTube
    • Use Tenant Controls in Access Rules
    • Review Tenant Controls Through Reports
  • Manage Network Devices
  • Manage Roaming Devices
    • View Internet Security Settings for Roaming Devices
    • Edit Internet Security Settings for Roaming Devices
    • Delete a Roaming Device
  • Manage Private Resources
    • Add a Private Resource
    • Discover Private Resources
    • Test Private Resource Reachability
    • Add a Private Resource Group
    • Private Resource Configuration Examples
  • Manage Connections to Private Destinations
    • Comparison of Zero Trust Access and VPN
    • Comparison of Client-Based and Browser-Based Zero Trust Access Connections
    • Requirements for Zero Trust Access
    • Configure Client-Based Zero Trust Access for Private Destinations
    • Configure Browser-Based Zero Trust Access to Private Resources
    • Network Authentication for Zero Trust Access
    • Connection Scenarios for Private Destinations
    • Manage Branch Connections
    • Allow SSH and RDP Access to Private Resources
  • Manage Network and Service Objects
    • Manage Network Objects
      • Add Network Objects
      • Edit a Network Object
      • Manage Details of a Network Object
      • Delete a Network Object
    • Manage Network Object Groups
      • Add Network Object Groups
      • Edit a Network Object Group
      • Manage Details of a Network Object Group
      • Delete a Network Object Group
    • Manage Service Objects
      • Add Service Objects
      • Edit a Service Object
      • Manage Details of a Service Object
      • Delete a Service Object
    • Manage Service Object Groups
      • Add Service Object Groups
      • Edit a Service Object Group
      • Manage Details of a Service Object Group
      • Delete a Service Object Group
  • Manage the Access Policy
    • About the Access Policy
    • Show Additional Data on Your Access Rules
    • Edit the Order of the Rules in Your Access Policy
    • Rule Defaults: Default Settings for Access Rules
    • Global Settings for Access Rules
    • Edit Rule Defaults and Global Settings
    • Edit the Default Access Rules
    • Using Wildcard Masks on Access Rules
  • Get Started With Internet Access Rules
    • Components for Internet Access Rules
    • Default Settings for Internet Access Rules
    • Add an Internet Access Rule
    • About Configuring Sources in Internet Access Rules
    • About Configuring Destinations in Internet Access Rules
    • Ensure Rule Matching for Encrypted Internet Traffic
    • Block Internet Access to Geographic Locations
    • Advanced Application Controls
    • Global Settings for Internet Access Rules
    • About Isolated Destinations
      • Isolate Downgrade
    • Troubleshoot Internet Access Rules
    • Zero Trust Access to Internet Destinations
  • Get Started With Private Access Rules
    • Components for Private Access Rules
    • Default Settings for Private Access Rules
    • Add a Private Access Rule
    • About Configuring Sources in Private Access Rules
    • About Configuring Destinations in Private Access Rules
    • About ZTA Private Access Enforcement
      • Most Specific Match Enforcement Mode
      • Multi-App Match Enforcement Mode
      • Multi-App with Resolved IP Match Enforcement Mode
    • About Endpoint Requirements in Access Rules
    • Allowing Traffic from Users and Devices on the Network
    • Global Settings for Private Access Rules
    • Troubleshoot Private Access Rules
  • Get Started with the Cisco Assistant
    • Add Rules with the Cisco Assistant
    • Cisco Assistant Rule Examples
    • Find Documented Answers with the Cisco Assistant
    • Troubleshoot with the Cisco Assistant
    • Messages Generated by the Cisco Assistant
  • Manage Endpoint Security
    • Endpoint Attributes
  • Manage Zero Trust Access Posture Profiles
    • Add a Client-Based Zero Trust Access Posture Profile
    • Add a Browser-Based Zero Trust Access Posture Profile
  • Manage VPN Connection Posture Profiles
    • Add a VPN Connection Posture Profile
  • Manage IPS Profiles
    • Add a Custom IPS Signature List
  • Manage Security Profiles
    • Security Profiles for Internet Access
    • Add a Security Profile for Internet Access
    • Enable SafeSearch
    • Security Profiles for Private Access
    • Add a Security Profile for Private Access
  • Manage App Risk Profiles
    • Add an App Risk Profile
  • Manage Threat Categories
    • Threat Category Descriptions
    • Add a Threat Category List
    • Dispute a Threat Categorization
  • Manage File Inspection and File Analysis
    • Enable File Inspection
    • Enable File Analysis by Cisco Secure Malware Analytics
    • Test File Inspection for Internet Access
    • Monitor File Inspection and Analysis Activity
    • Troubleshoot File Inspection and Analysis
  • Manage File Type Controls
    • Enable File Type Controls
    • File Types to Block
    • Review File Type Controls Through Reports
  • Manage Notification Pages
    • Preview Notification Pages
    • Create Custom Block and Warn Pages
    • Allow Users to Contact an Administrator
    • Block Page IP Addresses
  • Manage Traffic Decryption
    • Important Information About Do Not Decrypt Lists
    • Add a Do Not Decrypt List for Security Profiles for Internet Access
  • Manage Certificates
    • Certificates for Internet Decryption
    • Install the Cisco Secure Access Root Certificate
    • Add Customer CA Signed Root Certificate
    • View the Cisco Trusted Root Store
    • Manage Certificates for Private Resource Decryption
    • Certificates for Private Resource Decryption
    • Certificates for SAML Authentication
    • Manage SAML Certificates for Service Providers
    • Manage SAML VPN Service Provider Certificate Rotation
    • Manage SAML Certificates for Identity Providers
    • VPN Certificates for User and Device Authentication
    • Manage CA Certificates for VPN Connections
  • Manage the Data Loss Prevention Policy
    • Add a Real Time Rule to the Data Loss Prevention Policy
    • Understand Exclusions in a Real Time Rule
    • Supported Applications
    • Add an SaaS API Rule to the Data Loss Prevention Policy
    • Add an AI Guardrails Rule to the Data Loss Prevention Policy
    • Discovery Scan
    • Edit a Data Loss Prevention Rule
    • Delete a Data Loss Prevention Rule
    • Enable or Disable a Data Loss Prevention Rule
    • Supported File and Form Types
    • Best Practices for the Data Loss Protection Policy
  • Manage Data Classifications
    • Create a Data Classification
    • Copy and Customize a Built-In Data Classification
    • Delete or Edit a Classification
    • Create an Exact Data Match Identifier
    • Index Data for an EDM
    • Exact Data Match Field Types
    • Create an Indexed Document Match Identifier
    • Built-In Data Classifications
  • Built-in Data Identifiers
    • Copy and Customize a Data Identifier
    • Create a Custom Identifier
    • Custom Regular Expression Patterns
    • Individual Data Identifiers
  • Manage AI Guardrails Data Classifications
    • Create an AI Guardrails Data Classification
    • Copy and Customize a Built-In AI Guardrails Data Classification
    • Delete or Edit an AI Guardrails Data Classification
  • Manage Secure ICAP
  • Manage SaaS API Data Loss Prevention
    • Enable SaaS API Data Loss Prevention for AWS Tenants
    • Enable SaaS API Data Loss Prevention for Azure Tenants
    • Enable SaaS API Data Loss Prevention for Box Tenants
    • Enable SaaS API Data Loss Prevention for Dropbox Tenants
    • Enable SaaS API Data Loss Prevention for Google Drive Tenants
    • Enable SaaS API Data Loss Prevention for Microsoft 365 Tenants
    • Enable SaaS API Data Loss Prevention for ServiceNow Tenants
    • Enable SaaS API Data Loss Prevention for Slack Tenants
    • Enable SaaS API Data Loss Prevention for Webex Teams
  • Manage Cloud Malware Protection
    • Enable Cloud Malware Protection
    • Revoke Authorization for a Platform
    • Enable Cloud Malware Protection for AWS Tenants
    • Enable Cloud Malware Protection for Azure Tenants
    • Enable Cloud Malware Protection for Box Tenants
    • Enable Cloud Malware Protection for Dropbox Tenants
    • Enable Cloud Access Security Broker Features for Google Drive
    • Enable Cloud Access Security Broker Protection for Microsoft 365 Tenants
    • Enable Cloud Malware Protection for ServiceNow Tenants
    • Enable Cloud Malware Protection for Slack Tenants
    • Enable Cloud Malware Protection for Webex Teams
  • Manage Logging
    • Enable Logging
    • Enable Logging to Your Own S3 Bucket
    • Enable Logging to a Cisco-managed S3 Bucket
    • Change the Location of Event Data Logs
    • Stop Logging
    • Delete Logs
    • Log Formats and Versioning
      • Reports and CSV Formats
      • Admin Audit Log Formats
      • Cloud Firewall Log Formats
      • Data Loss Prevention (DLP) Log Formats
      • DNS Log Formats
      • File Events Log Formats
      • IPS Log Formats
      • Remote Access VPN Log Formats
      • Web Log Formats
      • Zero Trust Access Log Formats
      • Zero Trust Access Flow Log Formats
  • Manage API Keys
    • Add Secure Access API Keys
    • Add KeyAdmin API Keys
  • Manage Accounts
    • Add a New Account
    • Edit Account Settings
    • Delete an Account
    • Hide Sources with De-identification

DNS Forwarders

  • Get Started with Virtual Appliances
    • Prerequisites for Virtual Appliances
    • Virtual Appliance Deployment Guidelines
    • Virtual Appliance Sizing Guide
  • Manage VAs in Secure Access
    • Configure Authentication for Virtual Appliances
    • Manage DNS Forwarders
    • Manage Site for Virtual Appliance
    • Configure Updates for Virtual Appliances
  • Deploy Virtual Appliances
    • Deploy VAs in Hyper-V for Windows 2012 or Higher
    • Deploy VAs in VMware
    • Deploy VAs in Microsoft Azure
    • Deploy VAs in Amazon Web Services
    • Deploy VAs in Google Cloud Platform
    • Deploy VAs in KVM
    • Deploy VAs in Nutanix
    • Deploy VAs in Alibaba Cloud
  • Configure Virtual Appliances
    • Configure Settings on VAs
  • Local DNS Forwarding
  • Test Virtual Appliance Deployments
  • SNMP Monitoring for Virtual Appliances
  • Troubleshoot Virtual Appliances

Experience Insights

  • About Experience Insights
  • Onboard Experience Insights
    • Generate OAuth Bearer Token
  • Cisco AI Assistant for Experience Insights
  • Configure Experience Insights
  • View Endpoint Performance Map
  • View Summary of Endpoints
  • Wi-Fi Descriptions
  • View Common SaaS Applications
  • View User Dashboard
  • About Endpoint Agent Tests
    • Estimate Peak Traffic to Custom Targets for Default Endpoint Tests
    • Create HTTP Server Tests
    • Create Network Tests
    • View HTTP Server Test Results
    • View Network Test Results

Reports

  • Monitor Secure Access with Reports
    • Export Report Data to CSV
    • Bookmark and Share Reports
    • Report Search Window & Retention
    • Report Scheduling
    • Schedule a Report
    • Update a Scheduled Report
  • Remote Access Log Report
    • View the Remote Access Log Report
  • Activity Search Report
    • View and Customize the Activity Search Report
    • View Firewall Events in Activity Search Report
    • View Web Events in Activity Search Report
    • View Zero Trust Events in Activity Search Report
    • View Activity Search Report Actions
    • Schedule an Activity Search Report
    • Use Search and Advanced Search
  • Security Activity Report
    • View Activity and Details by Filters
    • View Activity and Details by Event Type or Security Category
    • View an Event's Details
    • Search for Security Activity
  • Total Requests Report
  • Activity Volume Report
  • App Discovery Report
    • View the App Discovery Report
    • View the Highest Risk Apps
    • Review Apps in the Apps Grid
    • View App Details
    • Change App Details
    • Control Apps
    • Control Advanced Apps
    • View Traffic Data Through SWG Service
  • Top Destinations Report
    • Destination Details
  • Top Categories Report
    • Category Details
  • Third-Party Apps Report
    • View App Details
  • Cloud Malware Report
  • Data Loss Prevention Report
  • Admin Audit Log Report
    • Export Admin Audit Log Report to an S3 Bucket

Cisco Secure Client

  • Cisco Secure Client Overview
  • Get Started and Manage Client-based Zero Trust Access from Mobile Devices
    • Set up the Zero Trust Access App for iOS Devices
    • Set up the Zero Trust Access App for Android Devices
    • Set up the Zero Trust Access App for Android on Samsung Devices
    • Monitor and Troubleshoot the Zero Trust Access App from Mobile Devices
  • Get Started with Cisco Secure Client on Windows and macOS Devices
    • Prerequisites
    • Download Cisco Secure Client
    • Download the OrgInfo.json File
    • Manual Installation of Cisco Secure Client (Windows and macOS)
    • Mass Deployment Overview
    • Mass Deployment (Windows)
    • Customize Windows Installation of Cisco Secure Client
    • Mass Deployment (macOS)
    • Customize macOS Installation of Cisco Secure Client
    • VPN Headend Deployment
    • Secure Firewall Management Center and Secure Firewall Threat Defense
    • Meraki Systems Manager (SM) Deployment
    • Migration from Umbrella Roaming Client
    • Install the Root Certificate for All Browsers
    • Cloud Management
    • Additional References
    • Remote Monitoring and Management Deployment Tutorials
  • Manage Zero Trust Access using Cisco Secure Client
    • Requirements for Secure Client with Zero Trust Access
    • Invite Users to Enroll in Zero Trust Access for Secure Client
    • Troubleshoot Client-Based Zero Trust Access
    • Unenroll a Device from Zero Trust Access
  • Manage Virtual Private Networks on Cisco Secure Client
    • Download the Virtual Private Network XML Profile
    • CA Certificates for VPN Connections
  • Manage Internet Security on Cisco Secure Client
    • Umbrella Roaming Security Module Requirements
    • Domain Management
    • Interpret Internet Security Diagnostics
    • DNS Protection Status
    • SWG Protection Status

Managed iOS

  • Cisco Security Connector: Secure Access Setup Guide
    • Quick Start
  • Meraki Registration
    • Verify Secure Access with Meraki
    • Meraki Documentation
  • Register an iOS Device Through Apple Configurator 2
  • IBM MaaS360 Registration
  • Intune Registration
  • Jamf Registration
  • MobileIron Registration
    • MobileIron Configuration
  • MobiConnect Registration
  • Workspace ONE Registration
  • Register an iOS Device Through a Generic MDM System
  • Apply an Access Policy to Your Mobile Device
    • Secure Access Reporting
  • Anonymize Devices
  • Export Device Data to CSV
  • Troubleshooting
  • Push the Cisco Root Certificate to Managed Devices
  • Configure Cellular and Wifi Domains
  • Configuring DNS Suffix Whitelisting

Managed Android

  • Secure Access Module for Cisco Secure Client (Android OS)
  • Deploy the Android Client
    • Android Configuration Download
    • Cisco Meraki MDM
    • MobileIron MDM
    • VMware Workspace ONE
    • Microsoft Intune MDM
    • Samsung Knox MDM
    • Push the Cisco Root Certificate to Devices
  • Manage Identities
  • Export Device Data to CSV
  • Troubleshooting
  • Frequently Asked Questions

Unmanaged Mobile Device Protection

  • Unmanaged Mobile Device Protection
  • Administrator Actions
  • End-user Actions

Integrations

  • Manage Third-Party Integrations
    • Chrome Enterprise Browser
  • Integrate ISE (Identity Services Engine) with Secure Access
    • Solution Overview
    • Components and Prerequisites
    • Solution Workflow
    • Connect Cisco ISE and Cisco pxGrid Cloud
    • Enable Cisco Security Cloud Exchange
    • Integrate Cisco ISE with Secure Access
    • Verify and Monitor Context Sharing
  • Integrate Catalyst SD-WAN with Secure Access
    • Solution Overview
    • Components and Prerequisites
    • Solution Workflow
    • Configure Context Sharing Between Catalyst SD-WAN and Secure Access
    • Verify and Monitor Context Sharing

Cisco Security for Chromebook Client

  • About Cisco Security for Chromebooks
  • Prerequisites for Cisco Security for Chromebooks Client
  • Limitations for Cisco Security for Chromebooks
  • Integrate the Google Workspace Identity Service
  • Deploy the Cisco Security for Chromebooks Client
    • Bypass Internal Domains from DNS-over-HTTPS (DoH)
    • Enable Reporting for Private IP Address of Chromebook Device
    • Verify Cisco Security for Chromebooks Client Deployment
    • Export Device Data to CSV
    • Troubleshoot Cisco Security for Chromebooks Client Deployment
  • View Protection Status of Chromebook Devices
  • Add Policies to a Chromebook Device
  • Cisco Security for Chromebooks Client FAQ
  • Google Workspace Identity Service FAQ

Troubleshoot Single Sign On Authentication

If you are unable to sign in to Secure Access through Cisco Security Cloud Sign On, contact Support.


Configure Single Sign-On Authentication > Troubleshoot Single Sign-On Authentication > Get Started

Updated over 1 year ago