Software Secure Access
Activity Manage

Cisco Secure Access Help Quickstarts Quickstart – Bring Your Own Device with Zero Trust Procedure

Last updated: Aug 20, 2025

Procedure

Before you begin

Procedure

1

Deploy network connectors in Secure Access.

2

Provision users and groups in Secure Access. For more information, see Manage Users and Groups.

3

Configure SAML integrations with identity providers (IdPs). For more information, see Configure Integrations with SAML Identity Providers.

4

Create Zero Trust (ZT) posture profiles for the user devices in the organization. For more information, see Manage Zero Trust Access Posture Profile.

5

Provide Secure Access private resource URLs to users on unmanaged devices.

6

Create a policy rule or add an ZT posture profile to an existing Secure Access rule. For more information, see Manage the Access Policy.

What to do next

  • Check that you can reach private resources protected by Secure Access.