This section contains instructions on how to integrate RSA SecurID Access with Salesforce using a SAML SSO Agent.
RSA Cloud Authentication Service
Follow the steps in this section to configure RSA Cloud Authentication Service as an SSO Agent SAML IdP to Salesforce .
1. Logon to the RSA SecurID Access console and browse to Applications > Application Catalog, search for Salesforce and click +Add to add the connector.
2. Enter a name for the application in the Name field on the Basic Information page and click the Next Step button.
3. Navigate to Initiate SAML Workflow section.
a. In the Connection URL field, verify the default setting.
b. Choose IDP-initiated.
Note: The following IDP-initiated configuration works for SP-initiated Salesforce connections as well.
4. Scroll down to SAML Identity Provider (Issuer) section.
a. Take note of the Identity Provider URL.
b. Take note of the Issuer Entity ID.
c. Select Choose File and upload the private key.
d. Select Choose File to import the public signing certificate.
e. Select the checkbox for Include Certificate in Outgoing Assertion.
5. Scroll down to the Service Provider section.
6. In the Assertion Consumer Service (ACS) URL field replace <DOMAIN> with your account domain or if in a developer environment replace with <DOMAIN>-dev-ed.
Note: The string following so= is the Salesforce Organization ID; which can be found on your Salesforce Administrator > Company Profile > Company Information page.
7. In the Audience (Service Provider Issuer ID) field replace <DOMAIN> with your account domain or if in a developer environment replace with <DOMAIN>-dev-ed.
8. Scroll down to the User Identity section. Verify the settings are correct for your environment. In this example the username to be presented in email format and the user account will be validated against the User Store selected.
9. Click Next Step.
10. On the User Access page, select Allow All Authenticated Users user policy from the available options.
11. Click Next Step.
12. On the Portal Display page, select Display in Portal.
13. Click Save and Finish.
14. Click Publish Changes. Your application is now enabled for SSO.
15. Navigate to Applications > My Applications.
16. Locate Salesforce in the list and from the Edit option, select Export Metadata.
Follow the steps in this section to configure Salesforce as an SSO Agent SAML SP to RSA Cloud Authentication Service.
1. Login to Salesforce administration console. https://login.salesforce.com
2. From the Setup menu, select Security Controls > Single Sign-On Settings.
3. Under the Federated authentication bullet, click Edit.
4. Mark the SAML Enabled checkbox, and click Save.
5. In the SAML Single Sign-On Settings section, choose New, to configure the setting manually or New from Metadata file if you wish to configure from metadata file.
Note: Choose the IDR_metadata file when configuring for IDR integration or choose Cloud_metadata when configuring for a Cloud IdP integration.
6. If you selected to configure manually, click New and complete form.
a. In the Name field, enter a name for this Authentication Service profile.
b. Click in the API Name field, and Salesforce automatically enters the name from the Name field.
c. In the Issuer field, enter the Identity Provider Entity ID for an IDR integration or https://<rsa_tenant>.auth.securid.com/saml-fe/sso for a Cloud IdP integration.
d. In the Entity ID field, enter an ID that starts with https://, for example, https://<instance>.my.salesforce.com. This must match the Audience (Service Provider Entity ID) field on the RSA SecurID Access.
e. In Identity Provider Certificate, click Browse and select RSA SecurID Access public certificate.
f. In SAML Identity Type, select Assertion contains User’s Salesforce.com username.
g. In SAML Identity Location, select Identity is in the NameIdentifier element of the Subject statement.
h. In Service Provider Initiated Request Binding, select HTTP Redirect for an IDR integration and HTTP POST for a Cloud IdP integration.
i. Click Save.
Note: If your environment requires SP signing select the Download Metadata button and return to the RSA console and edit the connector to import the metadata file which will import the certificate.
Configuration is complete.
Return to the main page for more certification related information.