ClearSlide - SAML Relying Party Configuration - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as Relying Party to ClearSlide.Procedure
- Sign in to RSA Cloud Administration Console.
- Click Authentication Clients > Relying Parties.
- On the Relying Party Catalog page, click Add a Relying Party and click Add for Service Provider SAML.
- On the Basic Information page, enter the name for the application in the Name field and click Next Step.
- On the Authentication page, choose SecurID manages all authentication.
- Select a Primary Authentication Method and Access Policy as required and click Next Step.
- Provide the Service Provider details in the following format:
- ACS URL: https://www.clearslide.com/auth/saml_login_tx?tm=<ClearSlide Team ID>.
- Service Provider Entity ID: http://www.clearslide.com.
Refer to the Configure ClearSlide configuration to obtain ACS URL.
- In the SAML Response Protection section, choose IdP signs assertion within response.
- Download the certificate by clicking Download Certificate.
- Click Show Advanced Configuration.
- Under the User Identity section, configure Identifier Type and Property. For example, Identifier Type: Auto Detect and Property: Auto Detect.
- Click Save and Finish.
- On the My Relying Parties page, click the Edit drop-down and select the Metadata option to download the metadata.
- Click Publish Changes. Your application is now enabled for SSO.
Configure ClearSlide
Perform these steps to configure ClearSlide.Procedure
- Contact ClearSlide support and request to enable SAML for your account.
- Log on to ClearSlide with SAML-enabled credentials - https://www.clearslide.com/auth/login.
- Click your Profile and select My Account.
- Click Single Sign-On.
- Select SAML 2.0 Provider in the Single Sign-On Provider, drop-down list and select the Require Single Sign-On for all users checkbox.
- Copy the SAML Consumer URL that can be used as the ACS URL for the RSA configuration.
- Scroll down to the Your SAML Provider Configurations section, provide the following details, and click Save:
- SAML Provider Endpoint – The SignleSignOnService value that can be obtained from the metadata file downloaded from RSA.
- SAML Provider Entity ID - The EntityID value that can be obtained from the metadata file downloaded from RSA.
- X.509 Certificate – Copy and paste the certificate downloaded from RSA.
The configuration is complete.
Return to ClearSlide - RSA Ready Implementation Guide.
Related Articles
Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 252Number of Views Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 519Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views PingFederate - Relying Party Configuration Using SAML - RSA Ready Implementation Guide 202Number of Views Microsoft Entra ID Custom Controls - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 193Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) Artifacts to gather in RSA Identity Governance & Lifecycle RSA Governance & Lifecycle 8.0.0 Administrators Guide RSA Governance & Lifecycle 8.0.0 Installation Guide
Don't see what you're looking for?