Webex Meetings now also supports Stage Manager, an iPad feature that lets people navigate between apps conveniently by overlapping and resizing app windows to get the desired view. With the help of Stage Manager, Webex users on iPad can keep their display organized to improve their focus while working.
I am having an issue with a user when they attempt to share their application screen in meetings they receive and error stating "Too many overlapping windows are causing the shared content to be blocked by the operating system. Close, minimize, or move any window that overlap the shared application window." This error only happens when they try to share a single application screen, if they share the whole screen it works just fine. It also does not matter what application they share, it happens with everything.
I am not sure, if it would be really necessary to create an own plist for SSO for Webex . Maybe it could be necessary, because there is no official team identifier for Webex , but I found an identifier called "com.cisco.webex" and some extensions (like for example "meetingmanager") . If I am right, it would be enough, to attach the first part of the - let me say - global team identifier (like "com.cisco.webex.") to the list of allowed applications to the Single Sign-On function, to get the Microsoft login screen. I did this and it works flawless, but I did not find a way to fill in the user credentials automaticly (its email address and password). The Microsoft login screen comes up, but the users email address and its password is not filled in. Would this be possible with a separate plist, like you wrote?
When the user is starting Webex, the user have to fill in his email address in the first webex login window. That is ok for us, After he clicked on "continue", the Microsoft (Single Sign On) Login window appears.
Therefore, the full URL to obtain the verification key in this scenario would be -b-us.webex.com/idb/oauth2/v2/keys/verification. Below is an example JSON object containing the new_verification_key field returned by the full verification URL:
To avoid any potential "man-in-the-middle" security threat, developers are encouraged to verify that the base URL specified by the iss field contains the webex.com domain before using it to verify the JWT.
1. Go to msstate.webex.com and signin to Webex with your ne...@msstate.edu email and NetPassword, then Duo authenicate. In Webex, select Downloads in the left sidebar menu (Modern View mode) or top dropdown menu (Classic View mode). Scroll down to Cisco Webex Productivity Tools and click Download.
df19127ead