Citrix ShareFile - SAML Relying Party Configuration RSA Ready Implementation Guide
Originally Published: 2023-08-02
This section describes how to integrate RSA Cloud Authentication Service with Citrix ShareFile using SAML Relying Party.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as Relying Party to Citrix ShareFile.
Procedure
- Log on to RSA Cloud Administration Console.
- On the Authentication Clients menu, click Relying Parties.
- Click Add a Relying Party on the My Relying Parties page.
- In the Relying Party Catalog, click Add for Service Provider SAML.
- On the Basic Information page, in the Name field, enter a name for the Service Provider.
- Click Next Step.
- On the Authentication page, select SecurID Access manages all authentication.
- In the Primary Authentication Method list, select your desired logon method as Password or SecurID.
- In the Access Policy list, select a policy that was previously configured.
- Click Next Step.
- Configure connection profile for ShareFile manually.
- Scroll down to the Service Provider Metadata section.
- ACL URL – Copy this from the Single sign-on/SAML 2.0 Configuration section of Login & Security Policy tab under Security on the ShareFile homepage.
- Service Provider Entity ID –https://<your domain>.sharefile.com
- Select Override and replace it with https://<your domain>.sharefile.com or select Default Service Provide Entity ID.
- Click Download Certificate and click Choose File and attach the .PEM file in the configuration. Fill the ACS URL and Service Provider Entity ID value.
- Configure User Identity for NAMEID mapping.
Identity Type – Email Address
Property - mail
- Click Save and Finish.
- On the My Relying Parties page, from the Edit list, select View or Download IdP Metadata.
- On the top menu, click Publish Changes.
Configure Citrix ShareFile
Perform these steps to configure Citrix ShareFile.
Procedure
- Log on to ShareFile admin console. https://<Your domain>.sharefile.com.
- Select Security > Login & Security Policy.
- Scroll down to Single sign-on/SAML2.0 Configuration. Copy the ACS URL and SP-Initiated Login URL for future needs.
- Fill Basic Settings with necessary information.
Your IDP Issuer/Entity ID :Copy the auto-generated entity id from RSA .
Login URL: Copy-paste the above value of IDP Issuer.
- Fill the Optional Settings form as shown in the following figure.
- Click Save.
Notes
ACS URL copied from Single sign-on/SAML2.0 Configuration will be used on the RSA end (Step 12 in the previous section).
Configuration is complete.
Return to main page.
Related Articles
Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 233Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views Microsoft Entra ID - SAML Relying Party Configuration - RSA Ready Implementation Guide 85Number of Views Workday - SAML Relying Party Configuration - RSA Ready Implementation Guide 4Number of Views F5 BIG-IP APM - SAML Relying Party Configuration - RSA Ready Implementation Guide 30Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?