Cerby - SAML Relying Party Configuration - RSA Ready Implementation Guide
This article describes how to integrate RSA with Cerby using SAML Relying Party.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as a Relying Party to Cerby.
Procedure
- Sign in to RSA Cloud Administration Console.
- Click Authentication Clients > Relying Parties.
- On the My Relying Parties page, click Add a Relying Party.
- On the Relying Party Catalog page, click Add for Service Provider SAML.
- On the Basic Information page, enter a name for the Service Provider in the Name field and click Next Step.
- On the Authentication page, choose SecurID manages all authentication.
- In the 2.0 Access Policy for Authentication drop-down list, select a policy that was previously configured and click Next Step.
- On the Connection Profile page, select Enter Manually.
- Scroll down to the Service Provider section and provide Assertion Consumer Service (ACS) URL and Audience (Service Provider Entity ID). These values can be retrieved from the Cerby configuration.
- Scroll down and click Show Advanced Configuration.
- In the User Identity section, under Statement Attributes, add the following:
- Attribute Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress, Attribute Source: Identity Source, Property: mail
- Attribute Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name, Attribute Source: Identity Source, Property: givenName
- Attribute Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname, Attribute Source: Identity Source, Property: sn
- Click Save and Finish.
- Locate the application that you created on the Relying Parties page and click the drop-down arrow next to Edit.
- Click Metadata > Download Metadata File.
- Click Publish Changes and wait for the operation to be completed.
Your application is now enabled for SSO.
Configure Cerby
Perform these steps to configure Cerby.
Procedure
As part of the configuration process, an e-mail will be received from Cerby Support to begin setting up the workspace.
- Click Create my workspace.
The Welcome to Cerby window appears. - Select Continue with Generic SAML.
- Enter a Workspace name (.cerby.com will be appended automatically) and click Create workspace.
- Make a note of the ACS URL and Entity ID values that are required for configuring RSA Cloud Authentication Service.
- After completing the RSA Cloud Authentication Service configuration steps, retrieve the IdP metadata mentioned earlier and upload it during this step.
- Select the I have already assigned users or groups to the application checkbox and click Finish Configuration.
- The workspace is successfully set up and you will be prompted to log in. Click Login.
You will be redirected to the Cerby dashboard.
Note: The first user who logs in during this step will be designated as the administrator for the configured workspace and will receive all administrator-related e-mails.
The configuration is complete.
Return to Cerby - RSA Ready Implementation Guide.
Related Articles
Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 242Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views Microsoft Entra ID - SAML Relying Party Configuration - RSA Ready Implementation Guide 85Number of Views Workday - SAML Relying Party Configuration - RSA Ready Implementation Guide 4Number of Views F5 BIG-IP APM - SAML Relying Party Configuration - RSA Ready Implementation Guide 30Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) How to factory reset an RSA Authentication Manager 8.x hardware appliance without a factory reset button from the Operatio… Deploying RSA Authenticator 6.2.2 for Windows Using DISM Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?