BigID - SAML Relying Party Configuration - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as Relying Party to BigID.Procedure
- Sign in to the RSA Cloud Administration Console.
- Navigate to the Authentication Clients menu and select Relying Parties.
- In the Relying Party Catalog, select Add a Relying Party and click Add for Service Provider SAML.
- On the Basic Information page, enter a name for the application in the Name field and click Next Step.
- In the Authentication tab, select SecurID manages all authentication .
- Select the Primary Authentication Method and Access Policy for Additional Authentication as required and click Next Step.
- Provide the Service Provider details in the following format:
- Assertion Consumer Service (ACS) URL: https://<your tenant id>. Mybigid.com/api/v1/saml/login/callback.
- Service Provider Entity ID: <BigId Entity ID>
Note: A Unique Tenant ID will be provided for your instance from BigID.
Refer to the Notes section for instructions to obtain Entity ID.
- In the SAML Response Protection section, select IdP signs assertion within response.
- Download the certificate by clicking Download Certificate.
- Under the User Identity section, select Show Advanced Configuration, then configure Identifier Type and Property as follows:
- Identifier Type: Auto Detect
- Property: Auto Detect
- Under the Attribute Extension section, add the attributes from BigID as shown in the following figure.
Note: Refer BigID configuration section for mapping the attributes.
- Click Save and Finish.
- On the My Relying Parties page, click Edit dropdown and select Metadata option to download the metadata.
- Click Publish Changes to save your settings. After publishing, your application will be enabled for SSO.
Notes:
- Entity ID can be found under SAML Settings in BigID platform.
- RSA Platform users must be part of a Group Membership that matches the SAML values specified in the BigID configuration (see the BigID configuration section).
Configure BigID
Perform these steps to configure BigID.Procedure
- Log in to BigID with admin credentials.
- Click on Settings and select Access Management.
- Click the IdP tab and check the Enabled box under SAML Settings.
- Provide the following details:
- Entity ID – Enter unique Name or ID.
- Select Upload XML and click Select File or Drop and upload the metadata file downloaded from the RSA platform.
- Click on TEST CONNECTION to test the configuration.
Refer Configure RSA section for the instructions on how to obtain metadata.
- Under the Configure User Attributes section add the following attributes under the Token Attribute section.
- Under the Configure Role Groups section, configure the roles and groups as required:
- Token Attribute: Role (Custom value)
- SAML Values: Admin (Custom value)
- Click Save.
The configuration is complete.
Return to BigID - RSA Ready Implementation Guide
Related Articles
Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 242Number of Views Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 502Number of Views Microsoft Entra ID - SAML Relying Party Configuration - RSA Ready Implementation Guide 85Number of Views Okta - SAML Relying Party Configuration - RSA Ready Implementation Guide 45Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) How to factory reset an RSA Authentication Manager 8.x hardware appliance without a factory reset button from the Operatio… Deploying RSA Authenticator 6.2.2 for Windows Using DISM Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?