Tutorial: Azure Active Directory integration with Cisco Spark
In this tutorial, you learn how to integrate Cisco Spark with Azure Active Directory (Azure AD).
Integrating Cisco Spark with Azure AD provides you with the following benefits:
- You can control in Azure AD who has access to Cisco Spark
- You can enable your users to automatically get signed-on to Cisco Spark (Single Sign-On) with their Azure AD accounts
- You can manage your accounts in one central location - the Azure portal
If you want to know more details about SaaS app integration with Azure AD, see what is application access and single sign-on with Azure Active Directory.
To configure Azure AD integration with Cisco Spark, you need the following items:
- An Azure AD subscription
- A Cisco Spark single sign-on enabled subscription
To test the steps in this tutorial, we do not recommend using a production environment.
To test the steps in this tutorial, you should follow these recommendations:
- Do not use your production environment, unless it is necessary.
- If you don't have an Azure AD trial environment, you can get a one-month trial here.
In this tutorial, you test Azure AD single sign-on in a test environment. The scenario outlined in this tutorial consists of two main building blocks:
- Adding Cisco Spark from the gallery
- Configuring and testing Azure AD single sign-on
Adding Cisco Spark from the gallery
To configure the integration of Cisco Spark into Azure AD, you need to add Cisco Spark from the gallery to your list of managed SaaS apps.
To add Cisco Spark from the gallery, perform the following steps:
In the Azure portal, on the left navigation panel, click Azure Active Directory icon.
Navigate to Enterprise applications. Then go to All applications.
To add new application, click New application button on the top of dialog.
In the search box, type Cisco Spark.
In the results panel, select Cisco Spark, and then click Add button to add the application.
Configuring and testing Azure AD single sign-on
In this section, you configure and test Azure AD single sign-on with Cisco Spark based on a test user called "Britta Simon."
For single sign-on to work, Azure AD needs to know what the counterpart user in Cisco Spark is to a user in Azure AD. In other words, a link relationship between an Azure AD user and the related user in Cisco Spark needs to be established.
In Cisco Spark, assign the value of the user name in Azure AD as the value of the Username to establish the link relationship.
To configure and test Azure AD single sign-on with Cisco Spark, you need to complete the following building blocks:
- Configuring Azure AD Single Sign-On - to enable your users to use this feature.
- Creating an Azure AD test user - to test Azure AD single sign-on with Britta Simon.
- Creating a Cisco Spark test user - to have a counterpart of Britta Simon in Cisco Spark that is linked to the Azure AD representation of user.
- Assigning the Azure AD test user - to enable Britta Simon to use Azure AD single sign-on.
- Testing Single Sign-On - to verify whether the configuration works.
Configuring Azure AD single sign-on
In this section, you enable Azure AD single sign-on in the Azure portal and configure single sign-on in your Cisco Spark application.
To configure Azure AD single sign-on with Cisco Spark, perform the following steps:
In the Azure portal, on the Cisco Spark application integration page, click Single sign-on.
On the Single sign-on dialog, select Mode as SAML-based Sign-on to enable single sign-on.
On the Cisco Spark Domain and URLs section, perform the following steps:
a. In the Sign-on URL textbox, type a URL as:
b. In the Identifier textbox, type a URL using the following pattern:
This value is not real. Update this value with the actual Identifier. Contact Cisco Spark Client support team to get this value.
On the SAML Signing Certificate section, click Metadata XML and then save the metadata file on your computer.
Cisco Spark application expects the SAML assertions to contain specific attributes. Configure the following attributes for this application. You can manage the values of these attributes from the User Attributes section on application integration page. The following screenshot shows an example for this.
In the User Attributes section on the Single sign-on dialog, configure SAML token attribute as shown in the image above and perform the following steps:
Attribute Name Attribute Value uid user.userprincipalname
a. Click Add attribute to open the Add Attribute dialog.
b. In the Name textbox, type the attribute name shown for that row.
c. From the Value list, type the attribute value shown for that row.
d. Click Ok.
Click Save button.
Sign in to Cisco Cloud Collaboration Management with your full administrator credentials.
Select Settings and under the Authentication section, click Modify.
Select Integrate a 3rd-party identity provider. (Advanced) and go to the next screen.
On the Import Idp Metadata page, either drag and drop the Azure AD metadata file onto the page or use the file browser option to locate and upload the Azure AD metadata file. Then, select Require certificate signed by a certificate authority in Metadata (more secure) and click Next.
Select Test SSO Connection, and when a new browser tab opens, authenticate with Azure AD by signing in.
Return to the Cisco Cloud Collaboration Management browser tab. If the test was successful, select This test was successful. Enable Single Sign-On option and click Next.
You can now read a concise version of these instructions inside the Azure portal, while you are setting up the app! After adding this app from the Active Directory > Enterprise Applications section, simply click the Single Sign-On tab and access the embedded documentation through the Configuration section at the bottom. You can read more about the embedded documentation feature here: Azure AD embedded documentation
Creating an Azure AD test user
The objective of this section is to create a test user in the Azure portal called Britta Simon.
To create a test user in Azure AD, perform the following steps:
In the Azure portal, on the left navigation pane, click Azure Active Directory icon.
To display the list of users, go to Users and groups and click All users.
To open the User dialog, click Add on the top of the dialog.
On the User dialog page, perform the following steps:
a. In the Name textbox, type BrittaSimon.
b. In the User name textbox, type the email address of BrittaSimon.
c. Select Show Password and write down the value of the Password.
d. Click Create.
Creating a Cisco Spark test user
In this section, you create a user called Britta Simon in Cisco Spark. In this section, you create a user called Britta Simon in Cisco Spark.
Go to the Cisco Cloud Collaboration Management with your full administrator credentials.
Click Users and then Manage Users.
In the Manage User window, select Manually add or modify users and click Next.
Select Names and Email address. Then, fill out the textbox as follows:
a. In the First Name textbox, type Britta.
b. In the Last Name textbox, type Simon.
c. In the Email address textbox, type email@example.com.
Click the plus sign to add Britta Simon. Then, click Next.
In the Add Services for Users window, click Save and then Finish.
Assigning the Azure AD test user
In this section, you enable Britta Simon to use Azure single sign-on by granting access to Cisco Spark.
To assign Britta Simon to Cisco Spark, perform the following steps:
In the Azure portal, open the applications view, and then navigate to the directory view and go to Enterprise applications then click All applications.
In the applications list, select Cisco Spark.
In the menu on the left, click Users and groups.
Click Add button. Then select Users and groups on Add Assignment dialog.
On Users and groups dialog, select Britta Simon in the Users list.
Click Select button on Users and groups dialog.
Click Assign button on Add Assignment dialog.
Testing single sign-on
The objective of this section is to test your Azure AD SSO configuration using the Access Panel.
When you click the Cisco Spark tile in the Access Panel, you should get automatically signed-on to your Cisco Spark application.