Software Secure Access
Activity Manage

Cisco Secure Access Help Quickstarts Quickstart – Cisco Secure Client with Zero Trust Access Procedure

Last updated: Aug 07, 2025

Procedure

  1. Deploy network connectors in Secure Access.
  2. Provision users and groups in Secure Access. For more information, see Manage Users and Groups.
  3. Configure SAML integrations with identity providers (IdPs). For more information, see Configure Integrations with SAML Identity Providers.
  4. Create Zero Trust (ZT) posture profiles for the user devices in the organization. For more information, see Manage Zero Trust Access Posture Profile.
  5. Create a policy rule or add an ZT posture profile to an existing Secure Access rule. For more information, see Manage the Access Policy.
  6. Deploy Cisco Secure Client with Zero Trust on user devices.