Cisco Cisco Expressway
l
Open Access Manager (OpenAM)
l
Ping Federate
High level task list
1. Configure a synchronizable relationship between the identity provider and your on-premises directory such
that authentication can securely be owned by the IdP. See Directory Integration and Identity Management
in the
in the
document.
2. Export SAML metadata file from the IdP. Check the documentation on your identity provider for the
procedure. For example, see Enable SAML SSO through the OpenAM IdP in the SAML SSO Deployment
Guide for Cisco Unified Communications Applications.
Guide for Cisco Unified Communications Applications.
3. Import the SAML metadata file from the IdP to the Unified CM servers and Cisco Unity Connection
servers that will be accessed by single sign-on. See the Unified Communications documentation or help
for more details.
for more details.
4. Export the SAML metadata files from the Unified CM servers and Cisco Unity Connection servers. For
example, see High-Level Circle of Trust Setup in the SAML SSO Deployment Guide for Cisco Unified
Communications Applications.
Communications Applications.
5. Create the Identity Provider on the Expressway-C, by importing the SAML metadata file from the IdP.
6. Associate the IdP with SIP domain(s) on the Expressway-C.
7. Export the SAML metadata file(s) from the (master) Expressway-C; ensure that it includes the externally
resolvable address of the (master) Expressway-E.
The SAML metadata file from the Expressway-C contains the X.509 certificate for signing and encrypting
SAML interchanges between the edge and the IdP, and the binding(s) that the IdP needs to redirect
clients to the Expressway-E (peers).
The SAML metadata file from the Expressway-C contains the X.509 certificate for signing and encrypting
SAML interchanges between the edge and the IdP, and the binding(s) that the IdP needs to redirect
clients to the Expressway-E (peers).
8. Import the SAML metadata files from the Unified CM servers and Cisco Unity Connection servers to the
IdP. An example using OpenAM is in the SAML SSO Deployment Guide for Cisco Unified
Communications Applications.
Communications Applications.
9. Similarly, import the SAML metadata file from the Expressway-C to the IdP. See your IdP documentation
for details.
10. Turn on SSO at the edge (on the Expressway-C and the Expressway-E).
Importing the SAML metadata from the IdP
1. On the Expressway-C, go to
Configuration > Unified Communications > Identity providers (IdP)
.
You only need to do this on the master peer of the cluster.
2. Click Import new IdP from SAML.
3. Use the Import SAML file control to locate the SAML metadata file from the IdP.
4. Click Upload.
The Expressway-C can now authenticate the IdP's communications and encrypt SAML communications
to the IdP.
to the IdP.
Associating domains with an IdP
You need to associate a domain with an IdP if you want the MRA users of that domain to authenticate via the
IdP. The IdP adds no value until you associate at least one domain with it.
IdP. The IdP adds no value until you associate at least one domain with it.
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide (X8.5)
Page 31 of 50
Single Sign-On (SSO) over the Collaboration Edge