This section describes how to integrate RSA SecurID Access with Dynatrace using Relying Party. Relying party uses SAML 2.0 to integrate RSA SecurID Access as a SAML Identity Provider (IdP) to Dynatrace SAML Service Provider (SP).
Architecture Diagram
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as a relying party SAML IdP to Dynatrace .
Procedure
1. Sign into the RSA Cloud Administration Console and browse to Authentication Clients > Relying Parties and click Add a Relying Party.
2. From the Relying Party Catalog, select the +Add button for Service Provider SAML.
3. In the Basic Information section, enter a name and click Next Step.
4. In the Authentication section, do the following:
a. Under Authentication Details, select RSA SecurID Access manages all authentication.
b. Select appropriate primary and additional authentication methods.
c. Click Next Step.
5. On the next page, under Connection Profile, click choose file and select the Dynatrace SP metadata XML file, which can be obtained from Step 4 of Configure Dynatrace.
6.In the Service Provider Metadata section the details should be automatically filled as we selected Dynatrace SP metadata XML file in Step 5 above.
a. Assertion Consumer Service (ACS) URL: The AssertionConsumerService URL obtained from Dynatrace SP metadata XML file in Step 5 above. In this case Assertion Consumer Service (ACS) URL is https://sso.dynatrace.com:443/saml2/sp/consumer.
b. Service Provider Entity ID: The entityID obtained from Dynatrace SP metadata XML file in Step 5 above. In this case entityID is https://sso.dynatrace.com:443/saml2/login.
7. In the Message Protection section:
a. Certificate should have been automatically shown as Dynatrace SP metadata XML file was imported in Step 5.
b. Click Download Certificate and save the certificate. This certificate is required in Step 6 of Configure Dynatrace .
c. Under Idp Sign, select Entire SAML Response.
8. Click Show Advanced Configuration.
9. Under Attribute Extension section, click on +Add button and add the following three attributes:
a. Attribute Name: Email, Attribute Source: Identity Source, Property: mail
b. Attribute Name: FirstName, Attribute Source: Identity Source, Property: givenName
c. Attribute Name: LastName, Attribute Source: Identity Source, Property: sn
10. Click Save and Finish.
11. Click the Publish Changes button in the top left corner of the page, and wait for the operation to complete.
12. On the My Relying Parties page, do the following:
a. Select View or Download IdP Metadata from the Edit drop-down list to view and download an XML file containing your RSA SecurID Access IdP’s metadata.
b. Click Download Metadata File in the View or Download Identity Provider Metadata page to download the file. A file named IdpMetadata.xml should be downloaded.
Configure Dynatrace
Perform these steps to integrate Dynatrace with RSA SecurID Access as a Relying Party SAML SP.
Note: For the remainder of this configuration, your domain must be verified in Dynatrace SaaS account.
Procedure
1. Log in to your Dynatrace SaaS account.
2. Navigate to Account Setting > Identity management > Single sign-on.
3. On the Single sign-on page, under Verified Domains click Add button for your domain.
4.On the Add configuration page, click Download XML and save the metadata file. This file is required in Step 5 of Configure RSA Cloud Authentication Service.
5. In the Upload XML section, select Choose file and select the RSA IDP metadata file downloaded in Step 12 of Configure RSA Cloud Authentication Service.
6. In the Attribute mapping section, specify the following:
a. First name attribute: Enter FirstName.
b. Last name attribute: Enter LastName.
7. Select Validate configuration to verify your settings. After verification one of the following may happen:
a. If validation is successful, Dynatrace displays a confirmation message. Close the message to return to Add configuration and then select Continue to display a summary of the validated configuration.
b. If there's an error in the Results list, select Edit configuration to fix it and re-validate.
8. On Enable SSO page, select Enable.
9. Click Save & continue.
Configuration is complete.
For additional integrations, see "Configuration Summary" section.
Related Articles
Dynatrace - SAML SSO Agent Configuration - RSA Ready SecurID Access Implementation Guide 4Number of Views Download RSA SecurID Access Cloud User Event audit logs using Cloud Administration REST API CLU 1.82KNumber of Views RSA Authentication Manager 8.8 Setup and Configuration Guide 717Number of Views RSA Release Notes: Cloud Access Service and RSA Authenticators 2.67KNumber of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide