How to enable logging in to the Cloud Admin Console with the IDR acting as the Third-Party Identity Provider (IdP)
Originally Published: 2021-04-09
Article Number
Applies To
RSA Product/Service Type: Cloud
Issue
Some customers would like to configure the IDR or the Load Balancer as a Third-party Identity Provider to the Cloud Admin Console, such that the IDR SSO Portal is used to login into Admin Console.
Tasks
Resolution
Other than the session that we will keep as a backup if we are locked out of the Admin Console, we will open two other sessions to the Cloud to be able to map the SAML Attributes:
- In the First Session on the Cloud Admin Console, go Applications --> My Applications.
- Click on Add an Application --> Create from Template --> SAML Direct.
- Ensure that under Basic Information, the Disabled checkmark is not checked, then go to Connection Profile.
- In the Second Session, go to My Account --> Company Settings --> Sessions & Authentication and under the Cloud Administration Console Authentication change the Primary Authentication From Password to Third-Party Identity Provider (IdP).
- Copy the link under Sign-In URL. NOTE: Take a note of that link because this is the SAML link you will use to sign in to your Admin Console.
- Back in the First Session where we create the SAML Application, no need to upload any metadata under Connection Profile, and under Initiate SAML Workflow paste the value copied in Step 5 under Connection URL.
- Ensure the method is SP-initiated, Binding Method is POST and do not check Signed.
- Copy the Identity Provider URL from the First Session to the Second Session under Issuer URL.
- In the First Session, keep Issuer Entity ID as it is the Default value.. and copy that value and paste it in the Second Session under Issuer ID
- In the first session Generate Cert Bundle, and give the CN to be your portal hostname then download and extract that .zip folder.
- In the first session choose the Private Key to be private.key, and upload file cert.pem to be the certificate.
- In the second session under SAML Response Signature ensure you upload the same cert.pem file from the Certificate Bundle.
- In the second session copy, the value under Assertion Consumer Service (ACS) URL and paste it in the first session under.
Assertion Consumer Service (ACS) URL - In the second session, copy the value under Audience ID and paste it in the first session under Audience (Service Provider Entity ID).
- In the first Session under User Identity, make sure the Identifier Type is Email Address and the Property is mail.
- Under Show Advanced Configuration leave everything unchecked.
- Configure the user access as needed, then Save the Application.
- In the second session, configure your Sign-Out URL to be https://<PortalHostname>/LogoutServlet
- Under Error URL, put the value to be https://<PortalHostname>?Signing-error-cas
- Also, Save Settings on the same Page and publish changes.
Related Articles
Name or service not known error when connecting Identity Router (IDR) to RSA Authentication Manager 253Number of Views RSA Authentication Manager stuck at startup after configuring Embedded IDR 373Number of Views How to upgrade an RSA SecurID Access IDR 335Number of Views Failed to deploy RSA IDR - VMware "Error updating httpd.conf" 115Number of Views Quick Setup Guide - Cloud Access Service IDR SSO 154Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?