HPE Aruba Clearpass - Relying Party Configuration - RSA Ready Implementation Guide
This article describes how to integrate Cloud Access Service (CAS) with HPE Aruba Clearpass using Relying Party.
Configure CAS
Perform these steps to configure CAS using Relying Party.
Procedure
- Sign in to RSA Cloud Administration Console.
- Navigate to Authentication Clients > Relying Parties.
- Click Add a Relying Party.
- From the Relying Party Catalog, select Add for Service Provider SAML.
- On the Basic Information page, enter the name for the application in the Name field.
- Click Next Step.
- In the Authentication section, choose RSA manages all authentication.
- From 2.0 Access Policy for Authentication dropdown list, select a policy that was previously configured, then select Next Step.
- In Data Input Method, you'll have the option to import metadata.
- Click Choose File and select the SP metadata.xml file provided by the HPE Aruba ClearPass configuration.
- Navigate to the Service Provider section. The following fields will be auto populated from the metadata, but ensure they are in the following format:
- Assertion Consumer Service (ACS) URL: https://<aruba-clearpass-hostname>/networkservices/saml2/sp/acs
- Service Provider Entity ID: https://<aruba-clearpass-hostname>/networkservices/saml2/sp
- In the Message Protection section, choose IdP signs entire SAML response.
- Click Download Certificate to download the certificate, which will be required for the HPE Aruba ClearPass configuration.
- Go to the User Identity section and select the following:
- Identifier Type > Email Address
- Property > mail
- In the Identity Provider section, make note of the Entity ID
- You can enter any identifier in the Discriminator text field, it will be appended to the Entity ID URL to ensure the Entity ID is unique to the Service Provider.
Configure HPE Aruba Clearpass
Perform these steps to configure HPE Aruba Clearpass
Procedure
- Log in to ClearPass Policy Manager as an administrator.
- Go to Administration > Certificates > Trust List.
- Click Add.
- In the Certificate File field, select the downloaded certificate during the RSA Cloud Access Service configuration.
- Set the Usage field to SAML from the dropdown list, then click Add Certificate.
- Navigate to Configuration > Identity > Single Sign-On (SSO).
- Enter the Identity Provider URL copied from RSA Cloud Access Service configuration in the Identity Provider (IdP) URL field.
- Select the necessary applications for your use cases from the Enable SSO for options. Only GuestOperators is currently enabled.
Note: Ensure that SSO is functioning correctly for Guest or Insight before enabling it for PolicyManager.
- Click Download to retrieve the ClearPass Service Provider (SP) metadata.
- From the Select Certificate dropdown list, choose the RSA Cloud Access Service certificate that was previously uploaded to the Certificate Trust List.
- Click Update to save the configuration.
- Navigate to Configuration > Service Templates & Wizards > Select ClearPass Admin SSO Login (SAML SP Service).
- Enter a Name Prefix. For example, rsaready or select a previously configured prefix from the dropdown list, then click Next.
- Select the application(s) for which SAML-based Single Sign-On (SSO) should be enabled.
- Ensure your selections match the options that were previously enabled for SSO during the SAML SP configuration.
- Click Add Service.
The Configuration is complete.
Related Articles
Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 567Number of Views HPE Aruba ClearPass - RADIUS Configuration with Authentication Manager - RSA Ready Implementation Guide 15Number of Views HPE Aruba ClearPass - RADIUS Configuration with Cloud Access Service - RSA Ready Implementation Guide 16Number of Views Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 252Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 117Number of Views
Trending Articles
RSA Authentication Manager 8.9 Release Notes (January 2026) RSA announces the availability of the RSA SecurID Hardware Appliance 230 based on the Dell PowerEdge R240 Server How to troubleshoot Oracle database ORA-04030 errors in RSA Identity Governance & Lifecycle RSA Authentication Manager Upgrade Process Microsoft SQL Server Collectors can no longer connect to the SQL Server database after upgrade to Microsoft SQL Server 201…
Don't see what you're looking for?