Information About Single Sign-On
This chapter describes how to configure single sign-on (SSO) for Cisco Catalyst SD-WAN.
Cisco Catalyst SD-WAN is generally compatible with SAML 2.0-compliant identity providers (IdPs), when configured according to industry standards. Cisco has tested and verified the following IdPs:
-
Okta
-
Active Directory Federation Services (ADFS)
-
PingID
-
Azure Active Directory (AD)
Note |
Because Cisco SD-WAN Manager supports the SAML2.0 standard, if you deploy an IdP other than those listed above and it does not work with Cisco SD-WAN Manager as expected, we recommend that you follow up with the IdP provider to troubleshoot the issue. |
Note |
For Cisco vManage Release 20.3.x through Cisco vManage Release 20.11.x, and for Cisco Catalyst SD-WAN Manager Release 20.12.1 and later, use IdP SAML metadata with 2048-bit key signature certificate for SSO authentication because metadata with 1024-bit key signature certificate is not supported. |
SSO enables secured access to multiple applications or websites with a single set of credentials. SSO requires the following components:
-
Identity provider IdP: This system stores user data, maintains and supports the authentication mechanism, for example, Okta, ADFS, PingID, and Azure AD.
-
Service provider: This system hosts the website or application of interest, for example, Cisco SD-WAN Manager.
-
Users: People with a registered account with the IdP and the service provider.
To integrate IdPs with service providers, the SSO uses security assertion mark-up language (SAML). SAML is an XML-based communication standard that allows you to share identities among multiple organizations and applications.
The following steps describe the intergration of IdPs with service providers:
-
Whenever a network administrator tries to log in to a service provider using an IdP, the service provider first sends an encrypted message to the IdP.
-
The IdP decrypts the message and validates the credentials of the network administrator by comparing the information with the IdP's database.
-
After the validation, the IdP sends an encrypted message to the service provider. The service provider decrypts the message from the IdP, and the administrator is allowed to access the service provider.
-
In general, IdP and service provider exchange information based on predefined standards. This standard is a set of certificates called SAML.
After completing the above process, the administrator is redirected to the IdP portal. The administrator must enter IdP credentials to log in to Cisco SD-WAN Manager.
Note |
The privileges for a particular administrator are provided based on the information available about that administrator in the IdP's database. |
Benefits of Single Sign-On
With a properly deployed SSO solution, you can do the following:
-
Eliminate weak passwords for each cloud application
-
Streamline the secured access process
-
Provide one-click access to cloud applications