<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Jabber SSO login with Azure AD. in Collaboration Applications</title>
    <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/3795635#M38947</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;Jonathan Schulenberg,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks a lot for the provided information, which was helpful for me.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Ranjith Raman&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 06 Feb 2019 05:53:20 GMT</pubDate>
    <dc:creator>ranjith raman</dc:creator>
    <dc:date>2019-02-06T05:53:20Z</dc:date>
    <item>
      <title>Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/3793649#M38921</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;Customer is currently &amp;nbsp;using SSO for Jabber using ADFS. Customer is looking at migrating SSO to &lt;STRONG&gt;Azure AD&lt;/STRONG&gt;, I would like to know if this is supported by Cisco.&lt;/P&gt;
&lt;P&gt;Kindly suggest.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Version :&amp;nbsp;Cisco Unified Presence 10.5.2.&lt;/P&gt;</description>
      <pubDate>Sun, 03 Feb 2019 08:49:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/3793649#M38921</guid>
      <dc:creator>ranjith raman</dc:creator>
      <dc:date>2019-02-03T08:49:27Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/3793770#M38923</link>
      <description>&lt;P&gt;Azure AD is *not* supported for LDAP synchronization on CUCM/CUC; however, any identity provider that supports SAML 2.0 is compatible for SSO. Be careful to keep these topics separate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The challenge with SAML&amp;nbsp;is that Cisco expects you to be knowledgeable about your chosen IdP and how to configure it. TAC&amp;nbsp;supports the SAML functionality on their app only; you must work through properly integrating it to&amp;nbsp;your IdP. For example, sometimes you need to manually modify the metadata file before uploading it. Cisco expects you to understand what modifications are required for your IdP to accept the file. There are a few configuration examples provided here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/unified-communications/unified-communications-manager-callmanager/products-configuration-examples-list.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/unified-communications/unified-communications-manager-callmanager/products-configuration-examples-list.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On a related note, I suggest upgrading to 11.5 or later where the SSO integration supports a single agreement for the cluster vs. individual agreements per-node. You must configure a multi-server Tomcat cert for this to be an option.&lt;/P&gt;</description>
      <pubDate>Sun, 03 Feb 2019 20:53:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/3793770#M38923</guid>
      <dc:creator>Jonathan Schulenberg</dc:creator>
      <dc:date>2019-02-03T20:53:22Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/3795635#M38947</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;Jonathan Schulenberg,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks a lot for the provided information, which was helpful for me.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Ranjith Raman&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Feb 2019 05:53:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/3795635#M38947</guid>
      <dc:creator>ranjith raman</dc:creator>
      <dc:date>2019-02-06T05:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/3814603#M39273</link>
      <description>&lt;P&gt;How did you build the required custom claim rules? Azure AD doesn't support them.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 00:04:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/3814603#M39273</guid>
      <dc:creator>Daryl Clark</dc:creator>
      <dc:date>2019-03-06T00:04:51Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/3990150#M41539</link>
      <description>&lt;P&gt;Has anyone successfully made this work?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 14:45:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/3990150#M41539</guid>
      <dc:creator>Christopher Stock</dc:creator>
      <dc:date>2019-11-27T14:45:33Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/3995538#M41610</link>
      <description>&lt;P&gt;It appears Microsoft still has not implemented support for multiple&amp;nbsp;Assertion Consumer Service (ACS) URLs with index attributes on Azure’s IdP offering. You won’t be able to get SAML working on subscribers without this. I just tried again this week and it’s not there. ADFS supports it but not Azure. If you work at a large/recognizable company that is likely to get Microsoft’s attention, I have the contact information of the responsible product manager - message me directly.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Dec 2019 21:13:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/3995538#M41610</guid>
      <dc:creator>Jonathan Schulenberg</dc:creator>
      <dc:date>2019-12-08T21:13:28Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4039400#M42189</link>
      <description>&lt;P&gt;Do know when we can expect an solution from Microsoft / Cisco for that specific problem?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Customers are migrating their MS Products to Cloud without AD onPrem.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We need LDAP Sync with Azure AD and AzureIdP for SSO for installed Cisco onPrem Infrastructure.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2020 16:07:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4039400#M42189</guid>
      <dc:creator>Thiago Perrini</dc:creator>
      <dc:date>2020-03-03T16:07:33Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4039405#M42190</link>
      <description>&lt;P&gt;Roadmap questions are NDA and cannot be discussed in a public forum.&lt;/P&gt;
&lt;P&gt;If you're a partner, you can try the partner forum, or reach out to your SE/AM for this.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2020 16:17:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4039405#M42190</guid>
      <dc:creator>Jaime Valencia</dc:creator>
      <dc:date>2020-03-03T16:17:03Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4082248#M42965</link>
      <description>&lt;P&gt;We are moving off Okta and did not renew our internet CA certs for the clusters.&amp;nbsp; I just tested single server AD domain certificates with Azure successful following the instructions in this blog.&amp;nbsp; I will soon remove my muti SAN certs and go with certs for each server.&amp;nbsp; The information in this blog worked.&amp;nbsp; Don't need to wait for the multi server to work.&amp;nbsp; Clusters are 11.5.&amp;nbsp; LDAP is AD not Azure.&lt;/P&gt;&lt;P&gt;&lt;A href="https://medium.com/@stoyan.stoitsev/cucm-sso-with-azure-ad-1d6ccaa55656" target="_blank"&gt;https://medium.com/@stoyan.stoitsev/cucm-sso-with-azure-ad-1d6ccaa55656&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2020 20:20:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4082248#M42965</guid>
      <dc:creator>George Paxson</dc:creator>
      <dc:date>2020-05-08T20:20:58Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4133923#M43736</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Any thoughts on the great&amp;nbsp;solution by Bernhard Albler?&lt;/P&gt;&lt;P&gt;&lt;A href="https://medium.com/@stoyan.stoitsev/cucm-sso-with-azure-ad-1d6ccaa55656" target="_blank"&gt;https://medium.com/@stoyan.stoitsev/cucm-sso-with-azure-ad-1d6ccaa55656&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 16:09:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4133923#M43736</guid>
      <dc:creator>viraj0raut</dc:creator>
      <dc:date>2020-08-11T16:09:42Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4133937#M43737</link>
      <description>&lt;P&gt;We implemented this and its working beautifully for us!&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 16:21:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4133937#M43737</guid>
      <dc:creator>Daryl Clark</dc:creator>
      <dc:date>2020-08-11T16:21:26Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4133942#M43738</link>
      <description>The latest third-hand info I have is Microsoft slipped support for multiple ACS URLs to the end of 2020. Bernhard and Stoyan did everyone a great service with that article. My understanding is that the BU intends to write a TechNote, or equivalent article, for that exact approach to make it "official". TAC will continue to only support the Cisco product and not the behavior/configuration of the SAML IdP; however, this will offer an equivalent to the ADFS-oriented articles they have posted.</description>
      <pubDate>Tue, 11 Aug 2020 16:28:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4133942#M43738</guid>
      <dc:creator>Jonathan Schulenberg</dc:creator>
      <dc:date>2020-08-11T16:28:25Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4133943#M43739</link>
      <description>&lt;P&gt;I have followed the instructions as in my previous post.&amp;nbsp; Moved CUCM and CUC from Okta to Azure.&amp;nbsp; Still have to debug Expressway.&amp;nbsp; No post yet for Expressway.&amp;nbsp; My initial attempt has not worked.&amp;nbsp; Have to debug it.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 16:31:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4133943#M43739</guid>
      <dc:creator>George Paxson</dc:creator>
      <dc:date>2020-08-11T16:31:07Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4146376#M43914</link>
      <description>&lt;P&gt;Just to update everyone - this thread keeps turning up in search results - Cisco has published a TechNote for&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/SAML_SSO_deployment_guide/Azure/cucm_b_saml-sso-microsoft-azure-idp.html" target="_blank" rel="noopener"&gt;SAML SSO Microsoft Azure Identity Provider&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;The trick, a shared signing certificate for the Azure IdP, was first discovered by Bernhard&amp;nbsp;Albler and&amp;nbsp;Stoyan&amp;nbsp;Stoitsev. It is published in their Medium.com article&amp;nbsp;&lt;A href="https://medium.com/@stoyan.stoitsev/cucm-sso-with-azure-ad-1d6ccaa55656" target="_blank" rel="noopener"&gt;Cisco CUCM and Expressway SSO with Azure AD&lt;/A&gt;. Cisco had expected Microsoft to add support for multiple ACS URLs; however, that has reportedly slipped on their roadmap. The business unit chose to (re)publish Bernhard and Stoyan's approach so it would be officially on Cisco.com.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Sep 2020 12:16:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4146376#M43914</guid>
      <dc:creator>Jonathan Schulenberg</dc:creator>
      <dc:date>2020-09-04T12:16:01Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4159506#M44159</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We migrated our 5 cucm 11.5 clusters to azure successfully.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Initially we used this procedure &lt;A href="https://medium.com/@stoyan.stoitsev/cucm-sso-with-azure-ad-1d6ccaa55656" target="_blank"&gt;https://medium.com/@stoyan.stoitsev/cucm-sso-with-azure-ad-1d6ccaa55656&lt;/A&gt;.to move two clusters.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;After this, at another mantenance window we try to use cisco official document &lt;A href="https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/SAML_SSO_deployment_guide/Azure/cucm_b_saml-sso-microsoft-azure-idp.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/SAML_SSO_deployment_guide/Azure/cucm_b_saml-sso-microsoft-azure-idp.html&lt;/A&gt;&amp;nbsp;to chante 3 final clusters and&amp;nbsp;we found a small difference, our environment did not worked with the "Default" mode as cisco document,&amp;nbsp; but "email address" as shown in the attached figure.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Today everything is working well on Azure.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 15:24:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4159506#M44159</guid>
      <dc:creator>Wagner Jose Fernandes Junior</dc:creator>
      <dc:date>2020-09-30T15:24:37Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4973657#M49708</link>
      <description>&lt;P&gt;Hi Jonathan Schulenberg,&lt;/P&gt;
&lt;P&gt;What happens if we sign the certificates of the collaboration applications with a public CA?&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="HwtZe"&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;In that case, this certificate that we must upload to Azure must be generated by the Public CA or it can be generated in an Enterprise CA?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2023 20:06:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4973657#M49708</guid>
      <dc:creator>Franklin Gonzalez Sevillano</dc:creator>
      <dc:date>2023-12-07T20:06:08Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4973666#M49709</link>
      <description>&lt;P&gt;I believe this is covered in the technote&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/SAML_SSO_deployment_guide/Azure/cucm_b_saml-sso-microsoft-azure-idp.html" target="_blank" rel="noopener nofollow noreferrer"&gt;SAML SSO Microsoft Azure Identity Provider&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If not, you can generate a certificate anywhere as this is just to encrypt the communications.&amp;nbsp; Simple non technical answer.&amp;nbsp; I believe we just generated a cert with OpenSSL.&amp;nbsp; We have reused the same cert though changes from on prem to Cisco dedicated instance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2023 20:26:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/4973666#M49709</guid>
      <dc:creator>George Paxson</dc:creator>
      <dc:date>2023-12-07T20:26:09Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/5022582#M49950</link>
      <description>&lt;P&gt;We're planning to try to use SAML SSO with Azure for our CUCM, IM&amp;amp;P, Unity (14SU3) and Expressway (14.0.7) estate. The guide looks good.&lt;/P&gt;&lt;P&gt;Can I ask (possibly a stupid question) is there any requirement to have OAuth enabled first in Enterprise parameters and Expressway or is this not necessary? Azure will instead do the token work and not prompt to sign in constantly?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 10:20:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/5022582#M49950</guid>
      <dc:creator>ly_36</dc:creator>
      <dc:date>2024-02-22T10:20:07Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/5022899#M49952</link>
      <description>&lt;P&gt;SAML and OAuth are technically independent of one another. When both are enabled the longer life OAuth tokens allow the client to skip the SAML IdP until/unless the refresh token expires. I consider it best practice to enable both, including SIP OAuth - an extra step, but you're not required to. An easy example of where OAuth makes a big difference are inbound calls on mobile devices. Without OAuth, the user will be prompted to re-authenticate to the SAML IdP if their cookie has expired. The chances of a user successfully re-authenticating - especially with MFA - before the CFNA timer expires are pretty low.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 17:46:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/5022899#M49952</guid>
      <dc:creator>Jonathan Schulenberg</dc:creator>
      <dc:date>2024-02-22T17:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: Jabber SSO login with Azure AD.</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/5051298#M50089</link>
      <description>&lt;P&gt;What item are we using for Common Name when creating the certificate for Azure? Nothing in the guide to indicate this&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 09:55:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-sso-login-with-azure-ad/m-p/5051298#M50089</guid>
      <dc:creator>ly_36</dc:creator>
      <dc:date>2024-03-27T09:55:32Z</dc:date>
    </item>
  </channel>
</rss>

