Microsoft Azure Active Directory - IdP for Cloud Authentication Service - RSA Ready Implementation Guide
Originally Published: 2022-02-10
This section describes how to configure Microsoft Azure Active Directory as an IdP for RSA Cloud Authentication Service.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as a service provider for Microsoft Azure Active Directory.
Procedure
- Sign into the RSA Cloud Administration Console and browse to My Account > Company Settings > Sessions & Authentication.
- In the Cloud Administration Console Authentication > Primary Authentication section, click Third-Party Identity Provider (IdP) and perform the following steps.
- Sign-in URL: Displays the URL that the administrators will use when they sign in to the Cloud Administration Console through a third-party IdP.
- Assertion Consumer Service (ACS) URL: Displays the URL that Microsoft Azure Active Directory will use to set up the service provider.
- Issuer ID: Enter the value provided by Microsoft Azure Active Directory under Single Sign-on > Set up.
- Issuer URL: Enter the value of the Login URL provided by Microsoft Azure Active Directory under Single Sign-on > Set up.
- Audience ID: Enter a value that the identity provider will insert into SAML assertions to indicate for whom the assertions are intended. The value is set as the Entity ID in SAML requests sent to the identity provider.
- In the SAML Response Signature section, click Choose File to upload a certificate that the Cloud Authentication Service uses to validate the assertion signature provided by Microsoft Azure Active Directory.
- Click Save Settings.
- Click Publish Changes.
Configure Microsoft Azure Active Directory
Perform these steps to configure Microsoft Azure Active Directory as the third-party IdP for RSA Cloud Authentication Service.
Procedure
- Sign into Microsoft Azure Active Directory Admin Console.
- In the left pane, click Enterprise applications.
- Click the plus icon for New Application and click Create your own application.
- On the Create your own application screen, enter a name for the app (RSA Cloud Authentication Service) and click Create.
The new application properties page appears. - On the Getting Started menu, click Set up single sign-on, and then choose SAML as the single sign-on method.
- In the Basic SAML Configuration section, click the edit icon and enter the Entity ID which should be the same as the Audience ID field that is configured on the RSA side.
- Enter the ACS URL provided by RSA.
- In the SAML Certificates section, download the signing certificate, which needs to be uploaded to RSA as the IdP signing certificate.
- In the Set up section, copy the Login URL and provide it as the Issuer URL and the Azure AD Identifier as the Issuer ID field in RSA Administration Console. See step 2 in the previous section.
- In the left pane, click Users and Groups and choose the users in your organization to whom you want to give access to the application.
Configuration is complete.
Return to the main page.
Related Articles
Microsoft Azure Active Directory - IdP for My Page - RSA Ready Implementation Guide 105Number of Views RSA Governance & Lifecycle Integration: Microsoft Azure Active Directory AD Summary 199Number of Views Microsoft Azure Active Directory - Third-Party IdP Integration - RSA Ready Implementation Guide 186Number of Views Microsoft 365 with Azure AD - RSA Ready Implementation Guide 98Number of Views Ping Identity - IdP for Cloud Authentication Service - RSA Ready Implementation Guide 9Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?