Information About Single Sign-On
This chapter describes how to configure single sign-on (SSO) for Cisco SD-WAN. Cisco SD-WAN supports SSO for the following identity providers (IdPs):
-
Okta
-
Active Directory Federation Services (ADFS)
-
PingID
-
Azure Active Directory (AD)
![]() Note |
For Cisco vManage 20.3.x release and later, use IdP SAML metadata with 2048-bit key signature certificate for SSO authentication because metadata with 1024-bit key signature certificate is not supported. |
Network administrators must access different websites or applications to carry out their operations. To access these websites or applications, they must have multiple sets of credentials for each website or application. There's a possibility that they have forgotten their credentials, or someone has stolen them. With the help of the single sign-on (SSO) technique, network administrators can now have a secured access to multiple applications or websites with only one set of credentials.
For the SSO to work, we mainly require three components:
-
Identity provider (IdP): This system stores user data, maintains and supports the authentication mechanism, for example, Okta, ADFS, PingID, and Azure AD.
-
Service provider: This system hosts the website or application of interest, for example, Cisco vManage.
-
Users: People with a registered account with the IdP and the service provider.
To integrate IdPs with service providers, the SSO uses security assertion mark-up language (SAML). SAML is an XML-based communication standard that allows you to share identities among multiple organizations and applications.
The following steps describe the intergration of IdPs with service providers:
-
Whenever a network administrator tries to log in to a service provider using an IdP, the service provider first sends an encrypted message to the IdP.
-
The IdP decrypts the message and validates the credentials of the network administrator by comparing the information with the IdP's database.
-
After the validation, the IdP sends an encrypted message to the service provider. The service provider decrypts the message from the IdP, and the administrator is allowed to access the service provider.
-
In general, IdP and service provider exchange information based on predefined standards. This standard is a set of certificates called SAML.
After completing the above process, the administrator is redirected to the IdP portal. The administrator must enter IdP credentials to log in to Cisco vManage.
![]() Note |
The privileges for a particular administrator are provided based on the information available about that administrator in the IdP's database. |
Benefits of Single Sign-On
With a properly deployed SSO solution, you can do the following:
-
Eliminate weak passwords for each cloud application
-
Streamline the secured access process
-
Provide one-click access to cloud applications