Check Point Gateway Mobile Access Portal - SAML My Page SSO Configuration for Cloud Authentication Service - RSA Ready Implementation Guide
This section describes how to integrate Check Point Mobile Access portal with RSA Cloud Authentication Service using My Page SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.
Procedure
- Access the RSA Cloud Admin Console > Access > My Page > Single Sign-On (SSO), and enable My Page SSO.
- Ensure that My Pages SSO is enabled and protected using the following two-factor authentication:
-
- Password.
- Access Policy.
- Go to Applications > Application Catalog, click Create From Template.
- Select SAML Direct.
- Go to the Basic Information page, enter a name for the configuration in the Name field, and click Next Step.
- In the Connection Profile section, click the IdP-initiated option.
- Provide the Service Provider details:
- ACS URL: Refer to Check Point configuration section to obtain this value.
- Service Provider Entity ID: Refer to Check Point configuration section to obtain this value.
- In the SAML Response Protection section, select IdP signs assertion within response. Download the certificate by clicking on Download Certificate.
- Select Show Connection Profile Advanced Configuration, under the User Identity section configure Identifier Type and Property as:
- Identifier Type – Auto Detect
- Property – Auto Detect
- Click Next Step.
- Choose the required Access Policy for this application and click Next Step > Save and Finish.
- On the My Applications page, click Edit Dropdown and select Metadata option to download the metadata.
- Click Publish Changes. After publishing, your application is now enabled for SSO.
The configuration is complete.
Configure Check Point Mobile Access portal
Perform these steps to configure Check Point Mobile Access Portal.
Procedure
- Log in to Check Point SmartConsole desktop application with admin credentials.
- From the left pane, go to Gateways & Servers tab.
- Double click the required deployed Check Point Gateway.
- In the General properties of the gateway, ensure that Mobile Access service is enabled.
Note: If Mobile Access service is not enabled, follow the prompt to enable the service. During the process, the Mobile Access portal URL is configured, and end users will use it to log in to the portal.
- In the Gateway & Servers tab, click New > More > User/Identity > Identity Provider.
- In the New Identity Provider window, choose a name for the RSA identity provider.
- Select the relevant Check Point Gateway from the Gateway dropdown list
- Select Mobile Access from the Service dropdown list.
- Copy the Entity ID and paste it in the Service Provider Entity ID field in RSA configuration.
- Copy the Reply URL and paste it in the ACS URL field in RSA configuration.
- Choose Import Metadata file.
- Go to the Metadata file downloaded from RSA, and the rest of the fields will be auto populated.
- In SmartConsole, click the Gateways & Servers panel.
- Open the Security Gateway object.
- From the left pane, click Mobile Access > Authentication.
- In the Multiple Authentication Client Settings section, click Add to add a new Realm object.
- On the Login Option pane, in the Usage in Gateway section, clear the box Use in Capsule Workspace.
- On the Login Option pane, in the Authentication Method section, click Add.
- Select Identity Provider.
- Click the green [+] button and select the SAML Identity Provider object. Click OK.
- In the Compatibility with Older clients section, disable Allow older clients to connect to this gateway with Authentication Method listed as Username and password.
Note: Follow the above step to only enforce RSA Authentication for users to log in. The Option for username and password authentication will not be available.
- In SmartConsole, click Publish.
- Select the applicable policy and choose Access Control.
- Click Install to apply the policy.
The configuration is complete.
Related Articles
Check Point Gateway Mobile Access Portal - RADIUS Configuration for Authentication Manager - RSA Ready Implementation Guide 48Number of Views Check Point Gateway - RSA Ready Implementation Guide 97Number of Views Microsoft Entra ID - SAML My Page SSO Configuration - RSA Ready Implementation Guide 207Number of Views Palo Alto Cloud Identity Engine - SAML My Page SSO Configuration - RSA Ready Implementation Guide 5Number of Views Palo Alto NGFW Global Protect - SAML My Page SSO Configuration - RSA Ready Implementation Guide 46Number of Views
Trending Articles
RSA Authentication Manager 8.9 Release Notes (January 2026) RSA announces the availability of the RSA SecurID Hardware Appliance 230 based on the Dell PowerEdge R240 Server How to troubleshoot Oracle database ORA-04030 errors in RSA Identity Governance & Lifecycle RSA Authentication Manager Upgrade Process Microsoft SQL Server Collectors can no longer connect to the SQL Server database after upgrade to Microsoft SQL Server 201…
Don't see what you're looking for?