You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/cisco-spark-tutorial.md
+15-7Lines changed: 15 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: na
16
16
ms.topic: tutorial
17
-
ms.date: 08/09/2019
17
+
ms.date: 01/15/2020
18
18
ms.author: jeedes
19
19
20
20
ms.collection: M365-identity-device-management
@@ -155,21 +155,29 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
155
155
156
156
## Configure Cisco Webex
157
157
158
-
1.Sign in to [Cisco Cloud Collaboration Management](https://admin.ciscospark.com/) with your full administrator credentials.
158
+
1.To automate the configuration within Cisco Webex, you need to install **My Apps Secure Sign-in browser extension** by clicking **Install the extension**.
159
159
160
-
2. Select **Settings** and under the **Authentication** section, click **Modify**.
2. After adding extension to the browser, click on **Set up Cisco Webex** will direct you to the Cisco Webex application. From there, provide the admin credentials to sign into Cisco Webex. The browser extension will automatically configure the application for you and automate steps 3-8.
163
+
164
+

165
+
166
+
3. If you want to setup Cisco Webex manually, sign in to [Cisco Cloud Collaboration Management](https://admin.ciscospark.com/) with your full administrator credentials.
167
+
168
+
4. Select **Settings** and under the **Authentication** section, click **Modify**.
161
169
162
170

163
171
164
-
3. Select **Integrate a 3rd-party identity provider. (Advanced)** and go to the next screen.
172
+
5. Select **Integrate a 3rd-party identity provider. (Advanced)** and go to the next screen.
165
173
166
-
4. On the **Import Idp Metadata** page, either drag and drop the Azure AD metadata file onto the page or use the file browser option to locate and upload the Azure AD metadata file. Then, select **Require certificate signed by a certificate authority in Metadata (more secure)** and click **Next**.
174
+
6. On the **Import Idp Metadata** page, either drag and drop the Azure AD metadata file onto the page or use the file browser option to locate and upload the Azure AD metadata file. Then, select **Require certificate signed by a certificate authority in Metadata (more secure)** and click **Next**.
167
175
168
176

169
177
170
-
5. Select **Test SSO Connection**, and when a new browser tab opens, authenticate with Azure AD by signing in.
178
+
7. Select **Test SSO Connection**, and when a new browser tab opens, authenticate with Azure AD by signing in.
171
179
172
-
6. Return to the **Cisco Cloud Collaboration Management** browser tab. If the test was successful, select **This test was successful. Enable Single Sign-On option** and click **Next**.
180
+
8. Return to the **Cisco Cloud Collaboration Management** browser tab. If the test was successful, select **This test was successful. Enable Single Sign-On option** and click **Next**.
0 commit comments