Guru - SAML SSO Agent Configuration - SecurID Access Implementation Guide
This section describes how to integrate SecurID Access with Guru using a SAML SSO Agent.
Architecture Diagram
Configure SecurID Access Cloud Authentication Service
Perform these steps to configure SecurID Access Cloud Authentication Service(CAS) as an SSO Agent SAML IdP to Guru.
Procedure
-
Sign into the SecurID Access Cloud Administration Console and browse to Applications > Application Catalog.
-
Click on Create From Template then click Select for SAML Direct.
-
On Basic Information page enter a Name for the application, ie. Guru Then click on Next Step.
-
On Connection Profile page.
-
Choose IDP-Initiated.
- In Connection URL field enter the ACS URL from the Guru configuration. See step i below.
-
Note the Identity Provider URL and Issuer Entity ID. These values are automatically generated. They may be needed later for the configuration of Guru.
-
Click on Generate Cert Bundle, set a a common name for your company certificate. Then click Generate and Download .
-
Select Choose File and upload the private key from the generated certificate bundle.
-
Select Choose File and upload the cert from the generated certificate bundle.
-
Select Include Certificate on Outgoing Assertion.
-
Scroll down to Service Provider section.
-
Enter the Assertion Consumer Service (ACS) This is based on your instance of Guru. The URL is in the form of - https://api.getguru.com/samlsso/<TEAMID> where <TEAMID> is specific to your instance. For example - https://api.getguru.com/samlsso/f92ad471-d4ef-4476-a19c-bd33361d9999. This can be found in the Guru configuration.
-
Enter the Audience (Service Provider Issuer ID) This is based on your instance of Guru. The URL is in the form of - https://api.getguru.com/samlsso/<TEAMID> where <TEAMID> is specific to your instance. For example - getguru.com/f92ad471-d4ef-4476-a19c-bd33361d9999. This can be found in the Guru configuration.
-
Scroll down to User Identity section.
-
Ensure Identifier Type = Email Address, set your Identity Source and Property = mail.
-
Click Next Step.
-
-
On User Access page select the Access Policy you require. Allow All Authenticated Users is the least restrictive. Click Next Step.
-
On Portal Display Page.
-
Select Display in Portal.
-
Upload an Application Icon if you wish.
-
Set an Application Tooltip if you wish.
-
Click on Save and Finish.
-
-
Click on Publish Changes. Your application is now enabled for SSO. If you make any additional changes to the application configuration you will need to republish.
Configure Guru
Perform these steps to integrate Guru with SecurID Access as a Relying Party SAML SP.
Procedure
-
Sign into Guru and browse to Team Settings.
-
Select Apps and Integrations.
-
Be sure to note the Team ID for your instance of Guru.
-
Choose SSO/SCIM.
-
For Identity Provider Single Sign-On URL copy the Identity Provider URL from the above in the SecurID CAS configuration. For example, https://portal.sso.pe.rsa.net/IdPServlet?idp_id=1vgsumatgu1jj.
-
For Identity Provider Issuer copy the Issuer Entity ID from the above in the SecurID CAS configuration. For example, 1vgsumatgu1jj.
-
For X.509 Certificate Copy and paste the contents of the certificated saved above in the SecurID CAS configuration. This is the "cert.pem" file from the generated certificate bundle in the SecurID CAS configuration. Do not copy the comments for BEGIN/END CERTIFICATE.
-
Choose your desired Provision Type:
-
Automatically add users - Guruwill add the user to the team the first time they log in via SSO.
-
Require users to be invited - You must explicitly invite users to your Guru Team (These users must additionally have access to your IDP).
-
Select SSO state to Enabled.
-
Click on Update SSO.
Configuration is complete.
Next Step: Head back to the main page.
Related Articles
ScreenSteps - SAML SSO Agent Configuration - SecurID Access Implementation Guide 3Number of Views Telemetry TV - SAML SSO Agent Configuration - SecurID Access Implementation Guide 3Number of Views RSA Governance and Lifecycle - SAML SSO Agent Configuration - RSA Ready SecurID Access Implementation Guide 36Number of Views Cisco Umbrella - SAML SSO Agent Configuration - SecurID Access Implementation Guide 16Number of Views Microsoft Entra ID - SAML My Page SSO Configuration - RSA Ready Implementation Guide 206Number of Views
Trending Articles
Connection fails to Cloud Authentication Service when connecting through a proxy server from RSA Authentication Manager to… Downloading RSA Authentication Manager license files or RSA Software token seed records Unable to login to RSA Authentication Manager Security Console as super admin RSA Authentication Manager 8.9 Release Notes (January 2026) How to manipulate imported RSA SecurID Software Token(s) on an iPhone or iPad device