Before You Begin

Prior to adding an AD group mapping to CDO as a form of user management, you must have your AD integrated with SecureX. If your AD Identity Provider (IdP) is not already integrated, open a Support Case with Cisco TAC and request a custom AD IdP integration with the following information:

  • Your CDO tenant name and region

  • Domain to define custom routing for (for example : @cisco.com, @myenterprise.com)

  • Certificate and federation metadata in .XML format

After your AD integration is complete, add the following custom SAML claims in your AD. The SAML claims and attributes are required, for you to be able to successfully sign in to your CDO tenant after your AD integration is done. Note that these values are case sensitive:

  • SamlADUserGroupIds - This attribute describes all group associations a user has on AD. For example, in Azure select + Add a group claim as seen in the screenshot below:

    Custom Claims defined in Active Directory
  • SamlSourceIdpIssuer - This attribute uniquely identifies an AD instance. For example, in Azure select+ Add a group claim and scroll to locate the Azure AD Identifier as seen in the screenshot below:

    Locate the Azure Active Directory Identifier