F5 BIG-IP APM - SAML Relying Party Configuration - RSA Ready Implementation Guide
Originally Published: 2019-06-25
This article describes how to integrate RSA with F5 BIG-IP APM using SAML Relying Party.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as a Relying Party to F5 BIG-IP APM
Procedure
- Sign in to RSA Cloud Administration Console.
- Click Authentication Clients > Relying Parties.
- On the My Relying Parties page, click Add a Relying Party.
- On the Relying Party Catalog page, click Add for Service Provider SAML.
- On the Basic Information page, enter a name for the Service Provider in the Name field.
- Click Next Step.
- On the Authentication page, choose SecurID Access manages all authentication.
- In the 2.0 Access Policy for Authentication drop-down list, select a policy that was previously configured.
- Click Next Step.
- On the Connection Profile page, select Enter Manually.
- Scroll down to the Service Provider section and enter the following details:
- ACS URL: https://Virtual machine domain name/post/acs
- Service Provider Entity ID: Enter https://<VIRTUAL-SERVER>
- For Audience for SAML Response, proceed with the Default: Service Provider Entity ID option.
- For SAML Response Protection, choose IdP signs entire SAML response.
- Click Download Certificate and save the certificate.
This certificate is required for SAML configuration in F5 BIG-IP APM. - Scroll down to the User Identity section and select the following:
- Identifier Type: emailAddress
- Property: mail
Note: Property must be mapped in F5 BIG-IP APM portal.
- Click Save and Finish.
- Locate the created application on the Relying Parties page and click the drop-down arrow next to Edit > Metadata > Download Metadata File.
- Click Publish Changes and wait for the operation to be completed.
After publishing, your application is now enabled for SSO.
Configure F5 BIG-IP APM
Perform these steps to integrate F5 BIGIP APM with RSA as a Relying Party.
Procedure
- Sign in to the BIG-IP Configuration Utility and click System > Certificate Management > Traffic Certificate Management > SSL Certificate List > Import.
- In the Import Type drop-down list, select Certificate.
- Enter the following details:
- Certificate Name: Choose New and enter a suitable name for the certificate.
- Certificate Source: Choose Upload File, click Choose File, and select the certificate downloaded in the Cloud Authentication Service configuration.
- Click import.
- Click Access > Federation > SAML Service Provider > External IdP Connectors.
- Click Create.
- On the Create New SAML IdP Connector window, under the General Settings tab, do the following:
- Name: Suitable name for this IdP Connector.
- IdP Entity ID: Enter the Issuer Entity ID obtained from the Cloud Authentication Service configuration.
- On the Create New SAML IdP Connector window, under Single Sign On Service Settings, do the following:
- Single Sign On Service URL: Enter the Identity Provider URL obtained from the Cloud Authentication Service configuration.
- Single Sign On Service Binding: Select POST in the the drop-down list.
- On the Create New SAML IdP Connector window, under Assertion Settings, select Identity Location as Subject in the drop-down list.
- On the Create New SAML IdP Connector window, under Security Settings, select the certificate imported from the IdP's Assertion Validation Certificate drop-down list.
- Click OK to complete the external IDP connectors.
- Click Access > Federation > SAML Service Provider > Local SP Services.
- Click Create.
- On the Create New SAML SP Service window, under General Settings, do the following:
- Name: Enter a suitable name for the SAML SP service.
- Entity ID: Enter https://<VIRTUAL-SERVER> replacing <VIRTUAL-SERVER> with the IP address or hostname of your Virtual Server as configured in F5. This should be the same as the Service Provider Entity ID as entered in the Cloud Authentication Service configuration.
- On the Local SP Services page, select the checkbox corresponding to the Service Provider.
- Click Bind/Unbind IdP Connectors at the bottom of the page.
- On the Edit SAML IdPs that use this SP window, click Add New Row.
- In the SAML IdP Connectors drop-down list, select the Connector created in the preceding section, and then click OK.
The configuration is complete.
Related Articles
F5 BIG-IP APM 14.1 - Access Profile Configuration - RSA Ready SecurID Access Implementation Guide 20Number of Views F5 BIG-IP APM 14.1 - Step-up Authentication Configuration - RSA Ready SecurID Access Implementation Guide 58Number of Views F5 BIG-IP APM - SAML My Page Configuration - RSA Ready Implementation Guide 22Number of Views F5 BIG-IP APM 14.1 - RADIUSwith AM Configuration - RSA Ready SecurID Access Implementation Guide 20Number of Views F5 BIG-IP APM - RSA Ready Implementation Guide 122Number of Views
Trending Articles
An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process
Don't see what you're looking for?