You can add a SAML 2 identity provider as a Cloud identity provider to automatically provide authentication for users who access cloud applications, such as My Page.
Before you begin
- You must be a Super Admin in the Cloud Administration Console.
- At least one identity router must be deployed and configured.
- At least one identity source must be connected to the identity router.
- A SAML 2-capable IdP must be available in your environment .
- Obtain the certificate.pem file from the IdP administrator. The identity router uses this certificate to validate signed assertions from the IdP.
In the Cloud Administration Console, click Users > Identity Providers.
Under Cloud Identity Providers, click Add.
In the Name field, enter a name for the new IdP or leave the default name.
(Optional) In the Description field, enter a description for the identity provider.
In the Issuer ID field, enter the idp_id (IdP identifier) string. The Issuer ID string, sometimes called the IdP Entity ID, will be provided to you by the IdP administrator. An example string is 7k3hslw5u8pw2.
In the Issuer URL field, enter the URL to which RSA SecurID Access sends requests.
- In the Audience ID field, enter the value that the identity provider inserts into SAML assertions to indicate who the assertions are intended for. The Audience ID must be an alphanumeric string with no special characters.This value must match the Audience ID you specify on the SAML 2 identity provider.
- In the Assertion Consumer Service (ACS) URL field, enter an ACS URL for the SAML 2 identity provider. This value must match the ACS URL you specify on the SAML 2 identity provider.Use the following format: https://ServiceProvider.example.com/ ecp_assertion_consumer.
(Optional) In the Requested Authentication Context field, enter the context (a set of rules that authentication must follow).
Select Sign Request if the service provider (RSA SecurID Access) signs the SAML request.
Selecting this option ensures that the IdP only accepts signed requests from the SP and rejects non-signed requests from the SP.
- Upload the certificate file you received from the IdP administrator (for example certificate.pem) to validate signed identity assertions from the IdP. Click Select File. Select the certificate file you received from the IdP administrator, and click OK.
- Click Save and Finish to exit the wizard.
- (Optional) Click Publish Changes to activate the settings immediately.
We want your feedback! Tell us what you think of this page.