Assembla- SAML Relying Party Configuration - SecurID Access Implementation Guide
This section describes how to integrate SecurID Access with Assembla using Relying Party. Relying party uses SAML 2.0 to integrate SecurID Access as a SAML Identity Provider (IdP) to Assembla SAML Service Provider (SP).
Architecture Diagram
Configure SecurID Access Cloud Authentication Service
Perform these steps to configure SecurID Access Cloud Authentication(CAS) Service as a relying party SAML IdP to Assembla .
Procedure
1. Sign into the SecurID Access Cloud Administration Console and browse to Authentication Clients > Relying Parties and click Add a Relying Party.
2. From the Relying Party Catalog select the +Add button for Service Provider SAML.
3. Enter a name for the Service Provider in the Name field on the Basic Information page.
4. Click the Next Step button.
5. On the Authentication page, select RSA SecurID Access manages all authentication.
6. From the Primary Authentication Method drop down, select your desired login method either Password or SecurID.
7. From the Access Policy for Additional Authentication drop down select a policy that was previously configured.
8. Click Next Step.
9. In the Connection Profile page, Navigate to Service Provider Metadata section.
a. For Assertion Consumer Service(ACS) URL, enter URL in the format - https://<DOMAIN>.assembla.com/p/saml/consume
b. For Audience (Service Provider Issuer ID), enter URL in the format - https://<DOMAIN>.assembla.com/p/home
where DOMAIN is the domain specific to your Assembla account.
10. Under Audience for SAML Response section , Make sure Default Service Provider Entity ID is selected.
11. Under Message Protection Section, click Download Certificate and save the certificate.
12. Click Show Advanced Configuration.
13. Under User Identity Section.
a. For Identifier Type, select Email Address.
b. For Property, select mail.
14. Under Identity Provider Section, note down the Entity ID value.
15. Click Save and Finish.
16. On the top menu click Publish Changes.
Configure Assembla
Perform these steps to integrate Assembla with SecurID Access as a Relying Party SAML SP.
Procedure
1. Login to your Assembla Account.
2. Navigate to Admin and then Scroll down to SAML Authentication.
3. Under SAML Authentication,
a. Check Enable checkbox.
b. Enter the Entity ID noted down in step 14 for "This is the URL of your Identity Provider that the authentication requests will be sent to” field.
c. Copy the contents of SecurID Access public certificate “IDPSigningCertificate.pem” file downloaded step 11 in previous section and paste it in the x.509 Certificate field.
d. Click Update SAML Settings.
Configuration is complete.
Return to the main page for more certification related information.
Related Articles
Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 547Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 116Number of Views Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 252Number of Views Okta - SAML Relying Party Configuration - RSA Ready Implementation Guide 45Number of Views Microsoft Entra ID Custom Controls - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 200Number of Views
Trending Articles
RSA MFA Agent 2.5 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process Downloading RSA Authentication Manager license files or RSA Software token seed records When configuring LDAP or LDAPS in RSA Authentication Manager with a global catalog the connection fails