BigID - SAML My Page SSO Configuration - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.Procedure
- Enable My Page SSO by accessing the RSA Cloud Admin Console > Access > My Page > Single Sign-On (SSO). Ensure it is enabled and protected using two-factor authentication - Password and Access Policy.
- On the Applications > Application Catalog page, click on Create From Template.
- On the Choose Connector Template page, click Select for SAML Direct.
- On the Basic Information page, enter a name for the configuration in the Name field and click Next Step.
- In the Connection Profile section, select IdP-initiated option.
- Provide the Service Provider details in the following format:
- Assertion Consumer Service (ACS) URL: https://<Tenant ID>. Mybigid.com/api/v1/saml/login/callback.
- Service Provider Entity ID: <BigId Entity ID>
Note: A Unique Tenant ID will be provided for your instance from BigID.
Refer to the Notes section for instructions to obtain Entity ID.
- In the SAML Response Protection section, select IdP signs assertion within response.
- Download the certificate by clicking Download Certificate.
- Under the User Identity section, select Show Advanced Configuration, then configure Identifier Type and Property as follows:
- Identifier Type: Auto Detect
- Property: Auto Detect
- Under the Statement Attributes section. add the attributes from BigID as shown in the following figure.
Note: Refer to the BigID configuration section for mapping the attributes.
- Click Next Step.
- Choose your desired Access Policy for this application and click Next Step > Save and Finish.
- On the My Applications page click the Edit dropdown and select Export Metadata to download the metadata.
- Click Publish Changes to save your settings. After publishing, your application will be enabled for SSO.
Notes
- Entity ID can be found under SAML Settings in BigID platform.
- RSA Platform users must be part of a Group Membership that matches the SAML values specified in the BigID configuration (see the BigID configuration section).
Configure BigID
Perform these steps to configure BigID.Procedure
- Log in to BigID with admin credentials.
- Click Settings and select Access Management.
- Click the IdP tab and check the Enabled box under SAML Settings.
- Provide the following details:
- Entity ID – Enter unique Name or ID.
- Select Upload XML and click Select File or Drop and upload the metadata file downloaded from the RSA platform.
- Click on TEST CONNECTION to test the configuration.
Refer Configure RSA section for the instructions on how to obtain metadata.
- Under the Configure User Attributes section add the following attributes under the Token Attribute section.
- Under the Configure Role Groups section, configure the roles and groups as required:
- Token Attribute: Role (Custom value)
- SAML Values: Admin (Custom value)
- Click Save.
Return to BigID - RSA Ready Implementation Guide
Related Articles
Palo Alto NGFW Global Protect - SAML My Page SSO Configuration - RSA Ready Implementation Guide 43Number of Views SilverFort - SAML My Page SSO Configuration - RSA Ready Implementation Guide 3Number of Views Salesforce - SAML My Page SSO Configuration - RSA Ready Implementation Guide 66Number of Views Microsoft Entra ID - SAML My Page SSO Configuration - RSA Ready Implementation Guide 206Number of Views Microsoft Office 365 - SAML My Page SSO Configuration - RSA Ready Implementation Guide 118Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) How to factory reset an RSA Authentication Manager 8.x hardware appliance without a factory reset button from the Operatio… Deploying RSA Authenticator 6.2.2 for Windows Using DISM Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?