This guide explains how to integrate Assertiv with Cisco Webex using SAML. When this set up is complete, users will be able to log into Webex using their Assertiv account.
Note: The screenshots used are for demonstrative purposes only and are accurate at time of writing. These screens can change over time. Please let us know if this document no longer reflects the application.
Get Metadata from Cisco Webex
Log into your Cisco Webex account as an administrator and navigate to the Site Administration section.
Click on Settings, then scroll down to Authentication, and click Modify
Select the 3rd-party identity provider option and click next.
Download the metadata file when prompted and click next.
Click Next, then keep this window open in the background whilst you complete the next section in Assertiv.
Create Cisco Webex app in Assertiv
Log into your Assertiv Organization (https://<your-org>.assertiv.com) as an Admin user and select the App Config dashboard tile.
Select the plus () button to create a new App config.
Search for the Cisco Webex application and select the icon.
You will be prompted for some information on the following page.
Import Webex Metadata
Click this button to open a prompt for submitting the Webex metadata file provided on your Webex account.
Browse to the file you downloaded (or paste the file contents) from the Cisco Webex website. Then click Load Webex Metadata
Application Name: The name entered here will be used when displaying this app to end users from their Applications page and in administrative app configuration pages.
Signing Certificate: The certificate is used to create a trust between Assertiv and Cisco Webex. For advanced users, if you have created a certificate you wish to use, select it here. Otherwise (or if you are unsure) you can select "-- Generate New Signing Certificate --".
Save the configuration. When the save completes, you will be taken to the Edit Service page.
Click the Download Metadata file to save the Assertiv metadata, this is needed for the Webex configuration.
Back on the Cisco Webex website, load the IDP Metadata from Assertiv.
Select the 'allow self-signed' option and click next.
Note: If you have loaded a publicly trusted signed certificate into Assertiv, you may select the first option.
Test the sign on process, then enable SAML SSO for Webex.
In order for your users to access your application from their Assertiv apps page, you must set up a role, assign users to the role, and give that role permission to access the application. This is required for testing the integration as well.
More details on roles can be found in the following articles