Amazon Web Services - SAML IDR SSO Configuration - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as an SSO Agent SAML IdP to AWS.Procedure
- Sign into the RSA Cloud Administration Console and navigate to Applications > Application Catalog.
- Search for Amazon Web Services and click Add to add the connector.
- On the Basic Information page, choose Identity Router.
- Enter the name for the application in the Name field and click Next Step.
- In the Initiate SAML Workflow section, choose IDP-initiated.
- In the Identity Provider section, perform the following steps:
- Choose the Override option, copy the value from the Identity Provider URL field, and enter in the Override field.
- Click Generate Cert Bundle to generate and download the zip file containing the private key and certificate. Unzip the downloaded file to extract the certificate and private key.
- Click Choose File and upload the RSA private key.
- Click Choose File and upload the RSA public certificate.
- In the Service Provider section, enter https://signin.aws.amazon.com/saml in the Assertion Consumer Service (ACS) URL field.
- Enter urn:amazon:webservices in the Audience (Service Provider Entity ID) field.
- In the User Identity section:
- Select persistent in the Identifier Type list.
- Select the name of your user Identity Source.
- Select the Property value as mail.
- In the Attribute Extension section:
- Select Identity Source in the Attribute Source list.
- Provide the Attribute Name as https://aws.amazon.com/SAML/Attributes/RoleSessionName.
- Select the Identity Source and choose mail from the Property list.
- To add a second attribute:
- Select Attribute Source as Constant.
- Provide the Attribute Name as https://aws.amazon.com/SAML/Attributes/Role.
- Provide Property as comma-separated values of the ARN of a role that the user can be mapped to, the ARN of the SAML provider. For example, the value is arn:aws:iam::380329356478:role/blrPE-role1, arn:aws:iam::380329356478:saml-provider/blrPE.
- (This step is required only if Session Tags by AWS need to be used.)
RSA supports Session Tags by AWS. The Session Tags can be passed with the RoleSessionName and Role attributes. To enable the RSA Cloud Authentication Service to pass additional attributes as Session Tags, perform the following steps:- In the Attribute Extension section, click ADD.
- For Principal Tags, select Attribute Source as Identity Source. The Attribute Name should be of the format https://aws.amazon.com/SAML/Attributes/PrincipalTag:<name> where <name> is used to identify the Tag and is user-defined. Select Property as the Identity Source attribute that you want to pass as Principal Tag. For example, if you want to pass "team" and "project" as Principal Tags, then the Attribute Names should be "https://aws.amazon.com/SAML/Attributes/PrincipalTag:team" and "https://aws.amazon.com/SAML/Attributes/PrincipalTag:project" respectively.
- For TransitiveTagKeys, select Attribute Type as Constant. The Attribute Name should be https://aws.amazon.com/SAML/Attributes/TransitiveTagKeys and specify the Property as <name> where <name> is the name defined for the Principal Tag. For example, if you want to pass "team" as the Transitive Tag Key, then the Property should be "team".
- Scroll down to the Uncommon Formatting SAML Response Options section. Under Sign Outgoing Assertion, choose Assertion within Response.
- Click Next Step.
- On the User Access page, select the access policy the identity router will use to determine which users can access the AWS service provider from the portal.
- Click Next Step.
- Configure the portal display settings on the Portal Display page.
- Enter descriptive text about the application in the Application Tooltip field. The portal displays this text when a user hovers over the application icon.
- Click Save and Finish.
- In the upper-right corner of the page, click Publish Changes and wait for the operation to be completed.
- Search for AWS in the list of applications and select Export Metadata in the Edit list to download an XML file containing your RSA IdP’s metadata. You need this file for configuring AWS.
- To configure and use Session Tags properly, the role permissions in AWS need to be modified according to Step 24 of next section.
- Currently, only single-valued attributes are supported by RSA for both Principal Tags and TransitiveTagKeys.
- If the values for Role ARN and Provider ARN are not known, enter placeholder values <RoleARN>,<ProviderARN> in the Property field to continue with the configuration. The actual value can be entered after completing the configuration of AWS as the Service Provider.
Configure AWS
Perform these steps to configure AWS.Procedure
- Sign into Identity and Access Management (IAM) console at https://console.aws.amazon.com/iam/ and in the navigation pane, click Identity providers.
- In the upper-right section, click Create Provider.
- Choose Provider Type as SAML.
- In the Provider Name section, enter a name for the Provider. For example, blrPEbiswaa2.
- In the Metadata Document section, choose the IDP metadata file that was downloaded from the IDP. (See Step 19 of configuring RSA Cloud Authentication Service).
- In the Metadata Document field, choose the IDP metadata file that was downloaded from the IDP. (See Step 21 of the previous section.)
- Click Next Step.
- Verify your Provider Name and Type.
- Click Create.
- Click the created Provider Name and copy Provider ARN which you must use as one of the values of attribute https://aws.amazon.com/SAML/Attributes/Role in your IDP settings.
- In the left pane, click Roles.
- Click Create role.
- In the Select type of trusted entity section, click SAML 2.0 federation.
- Select the SAML provider created before from the SAML provider list under Choose a SAML 2.0 provider section.
- In the Attribute list, select SAML:aud.
- In the Value field, enter https://signin.aws.amazon.com/saml.
- Click Next: Permissions.
- In the Attach permissions policies section, select the Policy Name/s you want to select for this role.
- Click Next: Tags.
- On the Add tags (optional) page, click Next: Review.
- On the Review page, provide a Role name. For example, blrPE-role1.
- Review the information and click Create role.
- Click the created Role name and copy Role ARN which you must use as one of the values of attribute https://aws.amazon.com/SAML/Attributes/Role in your IDP settings.
- (This step is required only if Session Tags by AWS need to be used.)
RSA supports Session Tags by AWS. To use Session Tags with this role, a new permission sts:TagSession needs to be added to the role. Perform the following steps to add this permission:- Click the created Role name.
- Click the Trust relationships tab.
- Click Edit trust relationship.
- In the policy document, add the following lines in the Statement section (<accountID> refers to your AWS Account ID and <provider-name> is the name of the provider created in Step 4.
{ "Effect": "Allow", "Principal": { "Federated": "arn:aws:iam::<accountID>:saml-provider/<provider-name>" }, "Action": "sts:TagSession", "Condition": { "StringEquals": { "SAML:aud": "https://signin.aws.amazon.com/saml" } } } - Click Update Trust Policy.
- To configure and use session tags properly, the Attribute Extension section of RSA Cloud Authentication Service needs to be modified according to Step 12 of the previous section.
- Currently, only single-valued attributes are supported by RSA for both Principal Tags and TransitiveTagKeys.
The configuration is complete.
Return to Amazon Web Services - RSA Ready Implementation Guide.
Related Articles
WordPress - RSA Ready Implementation Guide 1Number of Views RSA SecurID Access Free Trial Amazon Web Services Guide 7Number of Views Amazon Web Services - RSA Ready Implementation Guide 27Number of Views Amazon Web Services - SAML My Page SSO Configuration - RSA Ready Implementation Guide 25Number of Views Launch the Identity Router for Amazon Web Services 33Number of Views
Trending Articles
An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process
Don't see what you're looking for?