Absolute Secure Access - SAML My Page SSO Configuration - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.Procedure
- Sign in to the RSA Cloud Administration Console with administrator credentials.
- Enable SSO on the My Page portal by accessing the RSA Cloud Administration Console > Access > My Page > Single Sign-On (SSO). Ensure it is enabled and protected by two-factor authentication using a Password and Access Policy.
- Click Applications > My Applications.
- Click Add an Application.
- Click Create From Template.
- Click Select corresponding to SAML Direct.
- Configure the following options on the Basic Information page:
- Click the Cloud option under Choose where to enable your application.
- In the Name field, provide a name for the application; for example, Absolute Secure Access.
- In the Description field, provide a detailed description of the SAML application.
- Click Next Step.
- Configure the following options on the Connection Profile page:
- In the Initiate SAML Workflow section, click the SP-initiated option.
- Specify the FQDN or IP address of the Secure Access Server as the Connection URL. It is not used for the authentication for Absolute Secure Access.
- Select the Import Metadata option in the Data Input Method section.
- Click Choose File in the Data Input Method section.
- Locate and select the SP metadata from Secure Access. A summary of the imported SP metadata will be displayed.
- Verify the metadata information, and then click Save.
- Verify the details in the Service Provider and Identity Provider sections.
- Service Provider: The Assertion Consumer Service (ACS) URL should match the ACS Location setting from the SAML - SP Configuration option in the Secure Access Console with /saml/login appended to the end of the URL.
- Service Provider Entity ID: This setting should match the Entity ID setting from the SAML - SP Configuration option in the Secure Access Console.
- Identity Provider URL: Ensure a unique Identity Provider URL was generated by RSA.
- Select the SP signs SAML requests check box in the Message Protection > SAML Request Protection section, and then select the SP signing certificate PEM file created in the next section.
- Click Next Step.
- Configure the following options in the User Access section:
- Click the Select a Policy option.
- Select the access policy appropriate for Secure Access.
- Click Next Step.
- Configure the following options in the Portal Display section:
- Retain the Display in Portal check box cleared.
- Set an Application Icon and Application Tooltip if required.
- Click Save and Finish.
- Click Publish Changes.
- Click Applications > My Applications.
- Locate the SAML Application for Secure Access that was created in the previous step.
- Click the arrow icon beside Edit for the application, and then click Export Metadata.
Configure Absolute Secure Access
Perform these steps to configure Absolute Secure Access.
Procedure
Procedure
- Click Configure > Authentication Settings on the menu at the top of the page.
- Click New on the Authentication Settings page.
- Enter a descriptive name for the new Authentication Profile in the Profile name field, and then click OK.
- Select Authentication > User Authentication Protocol, change the Protocol option to SAML, and then click Apply.
- Select the SAML - SP Configuration option and provide the following details:
- Entity ID: The URL for the Secure Access Server or an identifier at the end of the URL if multiple SAML configurations are used. For example, https://secureaccess.absolute.com/ or https://secureaccess.absolute.com/rsa
- ACS Location: The URL for the Secure Access Server. For example, https://secureaccess.absolute.com/
- Click Apply.
- Click Generate New Certificate in the Signing certificate section.
- Click Download Metadata in the Metadata section.
- Create SP signing certificate from the SP metadata using the following steps.
- Open the downloaded SP metadata in a text editor.
- Open a new blank text editor document.
- Copy the entire SP signing certificate from the SP metadata. This is the value placed between the <ds:X509Certificate> and </ds:X509Certificate> section.
- Paste the value of the SP signing certificate in the blank text editor document.
- On a new line at the top of the text document containing only the SP signing certificate, add the following:
-----BEGIN CERTIFICATE----- - On a new line at the end of the text document containing the SP signing certificate, add the following:
-----END CERTIFICATE----- - Save the SP signing certificate as SPsigning.pem.
- Change the valid until value in SP metadata using the following steps.
- Open the downloaded SP metadata in a text editor.
- Locate the validUntil value.
- Modify the year to 5 years in the future. This will match the expiration of the SP signing certificate.
- Save the SP metadata.
- Click Configure > Authentication Settings on the menu at the top of the screen.
- Locate and select the Authentication Profile created in the previous steps.
- Select the SAML - IdP Configuration option and set the following options:
- Select the Setting Override check box.
- Click Choose File in the Identity provider metadata section.
- Locate and select the IdP metadata from the RSA console.
- Click Import.
- Change the Sign sign-on binding to HTTP POST.
- Click Apply.
Related Articles
How to secure access to the Authentication Web Service 2Number of Views Skyhigh Secure Web Gateway (Cloud using Agents) - SAML My Page SSO Configuration - RSA Ready Implementation Guide 11Number of Views Citrix Secure Access Gateway Login Issue 14Number of Views Absolute Secure Access - SAML Relying Party Configuration - RSA Ready Implementation Guide 20Number of Views SecurID users in Russian Federation cannot authenticate with software tokens 85Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) Artifacts to gather in RSA Identity Governance & Lifecycle RSA Governance & Lifecycle 8.0.0 Administrators Guide RSA Governance & Lifecycle 8.0.0 Installation Guide
Don't see what you're looking for?