This article describes how to configure the Cisco SD-WAN VManage portal.
- Cisco SD-Wan VManage
- Custom Security Assertion Markup Language (SAML)
For detailed instructions, please follow Configure OKTA Single Sign-On (SSO) on SD-WAN.
To configure SSO on the vManage UI:
- In vManage, click Administration > Settings > Identify Provider Settings > Edit.
- Click Enabled.
- Navigate to Click here to download the SAML metadata and save the content in a file. This data will be used for configuring Okta.
- In Metadata, follow the information to configure Okta with vManage:
- Entity ID
- Signing certificate
- Encryption certificate
- Logout URL
- Login URL
To configure SSO on the Okta Admin Console:
- Log in to the Okta console as an Okta Admin.
- Navigate to Add applications > Add application.
- Select SAML 2.0 and click Create.
- Use a string for the Application name.
- (Optional) Upload a logo and then click Next.
- At SAML Settings, add the SSO URL using the samlLoginResponse URL from the downloaded metadata from the vManage UI.
- Copy the entityID string and paste it into the Service Provider ID field.
- For Name ID format, select EmailAddress and then click Enter.
- For the Application username, select Okta username.
- For Show Advanced Settings, enter the fields as indicated in Configure OKTA Single Sign-On (SSO) on SD-WAN.
- Click Next.
- For App type, check This is an internal app that we have created (optional).
- Click Finish.
- This prompts the Okta application page.
- Click on View Setup Instructions.
- Copy the IDP metadata.
- Navigate back to the vManage UI.
- Click on Identity Provider Settings.
- Paste the IDP metadata that was copied to Upload Identity Provider Metadata, and then click Save.
To assign users to the application in Okta:
- On the Okta application page, navigate to Assignments > People > Assign.
- Select Assign to people from the drop-down menu.
- Click on Assign next to the user(s) that was selected and click Done.
- To add a user, click on Directory > Add Person > Save.
OKTA SAML Config Example
NOTE: Groups must match the Cisco vManage groups and be in lowercase.
