1Password - My Page SSO Configuration Using OIDC - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO (OIDC).Procedure
- Sign in to RSA Cloud Administration Console.
- Enable SSO on My Page by accessing the RSA Cloud Administration Console > Access > My Page > Single Sign-On (SSO).
- Enable two-factor authentication by using Password and Access Policy.
- Navigate to Applications > My Applications > Add an Application, and click Create From Template.
- Click Select against OIDC.
- On the Basic Information page, enter the name for the application in the Name field.
- Click Next Step.
- Choose the required option on the Authentication page and click Next Step.
- Under Connection Profile, provide the following details:
- Authorization Server Issuer URL is auto-populated.
- Redirect URL is obtained from 1Password (see next section).
- Copy and paste the Redirect URL to Connection URL.
- Provide a Client ID. It will be used for the 1Password configuration.
- Retain the Client Authentication Method as the default value, Not Selected.
- Provide the following scopes: openid, profile, and email (scopes should be added in advance. See Notes.)
- Provide the following claims: sub, name, and email ( claims should be added beforehand. See Notes.)
- Click Next Step.
- Click Save and Finish.
- Click Publish Changes.
Notes
- To add scopes, click Access > OIDC Settings.
- Click the Scopes tab and add the following scopes.
- Click Save Settings.
- To add claims, click the Claims tab and add the following claims.
- Click Save Settings.
- Click Publish Changes.
Configure 1Password
Perform these steps to configure 1Password.
Procedure
Procedure
- Sign in to 1Password admin console.
- In the right pane, click Policies, and then click Configure Identity Provider.
- Select Other in the Identity Provider drop-down list and provide a valid name.
- Provide the following details from the configuration done on RSA Cloud Administration Console.
- Client ID: Client ID name given in the connector configuration on the RSA side.
- Well-known URL: Use the following URL.
https:// <your RSA tenant> /sso/oidc/.well-known/openid-configuration
- Copy the Redirect URL and paste it into the connector created.
- Save and publish the connector before proceeding to the next step.
- Click Test Connection to verify the configuration. The user will be redirected to RSA where user details need to be provided. (This user should be configured on the RSA side). The connection should be successful.
- Save the configuration.
Related Articles
Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 509Number of Views Palo Alto NGFW Global Protect - SAML My Page SSO Configuration - RSA Ready Implementation Guide 43Number of Views Delinea - SAML My Page SSO Configuration - RSA Ready Implementation Guide 14Number of Views Microsoft Entra ID - SAML My Page SSO Configuration - RSA Ready Implementation Guide 206Number of Views Salesforce - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 105Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?