Federated Directory - SAML My Page SSO Configuration RSA Ready Implementation Guide
Originally Published: 2023-07-11
This section describes how to integrate Federated Directory with RSA Cloud Authentication Service using My Page SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.
Procedure
- Enable My Page SSO by accessing the RSA Cloud Administration Console > Access > My Page > Single Sign-On (SSO).
Ensure it is enabled and protected using two-factor authentication - Password and Access Policy. - On the Applications > Application Catalog page, click Create from Template.
- Select SAML Direct.
- Choose Cloud in the Basic Information section, and click Next Step.
- In the Connection Profile section, click the IDP-initiated option.
- Fill the Service Provider details in the following format:
- ACS URL: https://api.federated.directory/v2/Login/Saml2/<Directory ID>/Acs
- Service Provider Entity ID: federated.directory/<Directory ID>
- In the SAML Response Protection section, select IdP signs assertion within response.
- Select Override default signing key and certificate.
- Click Generate Cert Bundle or use your own certificates and perform the following steps:
- Select Choose File and upload the private key.
- Select Choose File to import the public signing certificate.
- Select Show Advanced Configuration, and under the User Identity section, select the Property type and Property value.
- Click Next Step.
- Choose your desired Access Policy for this application and click Next Step > Save and Finish.
- Click Publish Changes.
Configure Federated Directory
Perform these steps to configure Federated Directory.
Procedure
- Log on to your Federated Directory account.
- Navigate to Directories, then click CREATE DIRECTORY.
- Provide your new directory a name and a short description, then click CREATE DIRECTORY.
- Go to the Settings tab and copy the Id value. This value will be used in the ACS URL which will be added in RSA.
- Select the options of Federated Directory Accounts and SAML.
- Provide the value of IdP entity id generated in RSA and paste it on the Login URL.
- Paste the certificate value copied from the certificate generated (Step 9 of the previous section). Remove the begin certificate and end certificate comment before pasting.
Notes
User creation for testing requires selecting the option of Federated Directory accounts. For creating the user, perform the following steps.
- Go to the Users tab and click CREATE USER.
- Set the same password as in RSA for testing purposes.
To test the SP initiated flow, go to https://www.federated.directory/of/<your-company-name>
Configuration is complete.
Return to main page.
Related Articles
Federated Directory - SAML IDR SSO Configuration RSA Ready Implementation Guide 5Number of Views Federated Directory - SAML Relying Party Configuration RSA Ready Implementation Guide 2Number of Views Federated Directory - RSA Ready Implementation Guide 2Number of Views Error: 'Relying Party servlet: java.lang.NullPointerException' in RSA Federated Identity Manager (FIM) 30Number of Views RSA Governance & Lifecycle Federated Salesforce ADC Datasheet 5Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?