Check Point Gateway Mobile Access Portal - SAML My Page SSO Configuration for Cloud Authentication Service - RSA Ready Implementation Guide
This section describes how to integrate Check Point Mobile Access portal with RSA Cloud Authentication Service using My Page SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.
Procedure
- Access the RSA Cloud Admin Console > Access > My Page > Single Sign-On (SSO), and enable My Page SSO.
- Ensure that My Pages SSO is enabled and protected using the following two-factor authentication:
-
- Password.
- Access Policy.
- Go to Applications > Application Catalog, click Create From Template.
- Select SAML Direct.
- Go to the Basic Information page, enter a name for the configuration in the Name field, and click Next Step.
- In the Connection Profile section, click the IdP-initiated option.
- Provide the Service Provider details:
- ACS URL: Refer to Check Point configuration section to obtain this value.
- Service Provider Entity ID: Refer to Check Point configuration section to obtain this value.
- In the SAML Response Protection section, select IdP signs assertion within response. Download the certificate by clicking on Download Certificate.
- Select Show Connection Profile Advanced Configuration, under the User Identity section configure Identifier Type and Property as:
- Identifier Type – Auto Detect
- Property – Auto Detect
- Click Next Step.
- Choose the required Access Policy for this application and click Next Step > Save and Finish.
- On the My Applications page, click Edit Dropdown and select Metadata option to download the metadata.
- Click Publish Changes. After publishing, your application is now enabled for SSO.
The configuration is complete.
Configure Check Point Mobile Access portal
Perform these steps to configure Check Point Mobile Access Portal.
Procedure
- Log in to Check Point SmartConsole desktop application with admin credentials.
- From the left pane, go to Gateways & Servers tab.
- Double click the required deployed Check Point Gateway.
- In the General properties of the gateway, ensure that Mobile Access service is enabled.
Note: If Mobile Access service is not enabled, follow the prompt to enable the service. During the process, the Mobile Access portal URL is configured, and end users will use it to log in to the portal.
- In the Gateway & Servers tab, click New > More > User/Identity > Identity Provider.
- In the New Identity Provider window, choose a name for the RSA identity provider.
- Select the relevant Check Point Gateway from the Gateway dropdown list
- Select Mobile Access from the Service dropdown list.
- Copy the Entity ID and paste it in the Service Provider Entity ID field in RSA configuration.
- Copy the Reply URL and paste it in the ACS URL field in RSA configuration.
- Choose Import Metadata file.
- Go to the Metadata file downloaded from RSA, and the rest of the fields will be auto populated.
- In SmartConsole, click the Gateways & Servers panel.
- Open the Security Gateway object.
- From the left pane, click Mobile Access > Authentication.
- In the Multiple Authentication Client Settings section, click Add to add a new Realm object.
- On the Login Option pane, in the Usage in Gateway section, clear the box Use in Capsule Workspace.
- On the Login Option pane, in the Authentication Method section, click Add.
- Select Identity Provider.
- Click the green [+] button and select the SAML Identity Provider object. Click OK.
- In the Compatibility with Older clients section, disable Allow older clients to connect to this gateway with Authentication Method listed as Username and password.
Note: Follow the above step to only enforce RSA Authentication for users to log in. The Option for username and password authentication will not be available.
- In SmartConsole, click Publish.
- Select the applicable policy and choose Access Control.
- Click Install to apply the policy.
The configuration is complete.
Related Articles
An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x 1.16KNumber of Views KCA Apache web server showing security vulnerability with scan due patch level/version 46Number of Views Determine the correct root (base DN) and user search filter when configuring an identity source for the RSA SecurID Access… 133Number of Views User ID does not have the correct service account role error when trying to authenticate using an RSA Authentication Manag… 83Number of Views Running script to determine if hardware appliance can successfully upgrade to Authentication Manager 8.7 SP1 434Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?