Single sign-on (SSO) is an authentication and authorization process. SSO allows users to sign in to one application and then securely access other authorized applications without a prompt to resupply user credentials. SSO permits Cisco supervisors or agents to sign on only once with a username and password to gain access to all of their Cisco browser-based applications and services within a single browser instance. By using SSO, Cisco administrators can manage all users from a common user directory and enforce password policies for all users consistently.
Single sign-on is an optional feature whose implementation requires you to enable the HTTPS protocol across the enterprise solution.
Implementing SSO requires careful planning and preparation. Review all the installation, configuration, and administration information in the Configuring Guide for Cisco HCS for Contact Center at http://www.cisco.com/c/en/us/support/unified-communications/hosted-collaboration-solution-contact-center/products-installation-guides-list.html.
You can choose from three different modes when deciding about implementing single sign-on:
SSO supports agents and supervisors as follows:
Agents - Includes Cisco Finesse, Cisco Finesse-hosted gadgets, and Enterprise Chat and Email (ECE).
Supervisors - Includes Cisco Finesse, Cisco Unified Intelligence Center (CUIC), and Reskilling by using Unified CCE Web Administration.
SSO requires an Identity Provider that supports Security Assertion Markup Language (SAML) 2.0. For a current list of supported Identity Provider products and versions, refer to the Compatibility Matrix for this solution at http://docwiki.cisco.com/wiki/Compatibility_Matrixes_for_Contact_Center_Solutions.
This release currently supports Microsoft Active Directory Federation Services (ADFS) Windows Server 2012 R2.
Unified CCE Administration provides a new single sign-on tool to register and test components with SSO, and to set the SSO mode.
Integrate Third-Party Applications with Single Sign-On