1Password - My Page SSO Configuration Using OIDC - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO (OIDC).Procedure
- Sign in to RSA Cloud Administration Console.
- Enable SSO on My Page by accessing the RSA Cloud Administration Console > Access > My Page > Single Sign-On (SSO).
- Enable two-factor authentication by using Password and Access Policy.
- Navigate to Applications > My Applications > Add an Application, and click Create From Template.
- Click Select against OIDC.
- On the Basic Information page, enter the name for the application in the Name field.
- Click Next Step.
- Choose the required option on the Authentication page and click Next Step.
- Under Connection Profile, provide the following details:
- Authorization Server Issuer URL is auto-populated.
- Redirect URL is obtained from 1Password (see next section).
- Copy and paste the Redirect URL to Connection URL.
- Provide a Client ID. It will be used for the 1Password configuration.
- Retain the Client Authentication Method as the default value, Not Selected.
- Provide the following scopes: openid, profile, and email (scopes should be added in advance. See Notes.)
- Provide the following claims: sub, name, and email ( claims should be added beforehand. See Notes.)
- Click Next Step.
- Click Save and Finish.
- Click Publish Changes.
Notes
- To add scopes, click Access > OIDC Settings.
- Click the Scopes tab and add the following scopes.
- Click Save Settings.
- To add claims, click the Claims tab and add the following claims.
- Click Save Settings.
- Click Publish Changes.
Configure 1Password
Perform these steps to configure 1Password.
Procedure
Procedure
- Sign in to 1Password admin console.
- In the right pane, click Policies, and then click Configure Identity Provider.
- Select Other in the Identity Provider drop-down list and provide a valid name.
- Provide the following details from the configuration done on RSA Cloud Administration Console.
- Client ID: Client ID name given in the connector configuration on the RSA side.
- Well-known URL: Use the following URL.
https:// <your RSA tenant> /sso/oidc/.well-known/openid-configuration
- Copy the Redirect URL and paste it into the connector created.
- Save and publish the connector before proceeding to the next step.
- Click Test Connection to verify the configuration. The user will be redirected to RSA where user details need to be provided. (This user should be configured on the RSA side). The connection should be successful.
- Save the configuration.
Related Articles
Palo Alto NGFW Global Protect - SAML My Page SSO Configuration - RSA Ready Implementation Guide 43Number of Views Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 499Number of Views Microsoft Entra ID - SAML My Page SSO Configuration - RSA Ready Implementation Guide 204Number of Views Salesforce - SAML My Page SSO Configuration - RSA Ready Implementation Guide 66Number of Views JAMF Connect - My Page SSO Configuration using OIDC- RSA Ready Implementation Guide 8Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?