Procedure
- Deploy network connectors in Secure Access.
- Deploy connector groups in Secure Access. For more information, see Manage Resource Connectors and Connector Groups.
- Deploy network tunnel groups in Secure Access. For more information, see Manage Network Tunnel Groups.
- Configure a network tunnel on a network device from within your data center or public network. For more information, see Device Compatibility and Network Tunnels.
- Provision users and groups in Secure Access. For more information, see Manage Users and Groups.
- Configure SAML integrations with identity providers (IdPs). For more information, see Configure Integrations with SAML Identity Providers.
- Create Zero Trust (ZT) posture profiles for the user devices in the organization. For more information, see Manage Zero Trust Access Posture Profile.
- Create a policy rule or add an ZT posture profile to an existing Secure Access rule. For more information, see Manage the Access Policy.
- Deploy Cisco Secure Client with Zero Trust on user devices.