This article describes how to add RSA as an external authenticator for Microsoft Entra ID.
Configure RSA Assurance Level
The access policy for an application or authentication client specifies an assurance level if the application requires additional authentication. To access the application or authentication client, users must successfully authenticate using an option from that assurance level or a higher assurance level.
A user can select another option at any time, as long as the assigned assurance level or a higher assurance level contains additional options that the user can complete.
Procedure
- Sign into RSA Cloud Administration Console.
- Navigate to Access > Assurance Levels.
- Add the authenticators as per the requirement. Note that the authenticators selected for the selected assurance level or the higher assurance level must be part of the supported authenticators from the table in the Supported features section.
Configure RSA Access Policies
Perform the following steps to configure access policies.
Procedure
- Sign in to RSA Cloud Administration Console.
- Navigate to Access > Policies.
- Click Add a policy.
- On the Basic Information page, provide a name for your policy.
- Click Next Step.
- On the Identity Sources page, select the required identity sources and click Next Step.
- Select the Primary Authentication as Disable and click Next Step.
- In the Rule Sets tab perform the following actions:
-
- Select your Target Population. It can be a subset of users based on user attribute or All Users.
- In Access Details subsection ,if Access is selected as Allowed, skip this step.
- If Access is selected as conditional ,click on Add button to reach Authentication Condition form .
- Select any attribute with any value and set the Action as Authenticate and select the Assurance Level configured that conforms to the expectation as mentioned in the Configure Assurance Level section.
Note: Selecting any attribute and setting up Action to Allow Access will fail the authentication from Microsoft. Authentication must happen with the Assurance Level configured that conforms to the expectation as mentioned in the Configure Assurance Level section.
- Select Additional Authentication as Required and select the Assurance Level configured that conforms to the expectation as mentioned in the Configure Assurance Level section.
Note: Authentication must happen with the Assurance Level configured that conforms to the expectation as mentioned in the Configure Assurance Level section.
- Click Save and Finish.
- Click Publish Changes.
Notes
- Customers need to make sure that the access policy assigned to the EAM connector makes the user authenticate with a method that satisfies the EAM MFA requirements. Customers cannot use the Allow Access action in their policy as this means users won't authenticate.
- Assurance Level used must have only those authenticators which conform to the expectation as mentioned in the Configure Assurance Level section
- Some of the scenarios that will fail Microsoft authentication:
- The below setup ,irrespective of the condition, will fail authentication from Microsoft as the user is not prompted to authenticate.
-
- The below setup will fail authentication from Microsoft as the user is not prompted to authenticate.
-
- The setup below will fail authentication from Microsoft as the Assurance Level does not conform to the expectation as mentioned in the Configure Assurance Level section. Emergency Access Code and Password are not supported by Microsoft and should not be added to the Assurance Level that will be used .
Configure RSA Cloud Authentication Service as Relying Party
Perform these steps to configure RSA Cloud Authentication Service as Relying Party to Microsoft Entra ID.
Procedure
- Sign in to RSA Cloud Administration Console.
- Click Authentication Clients > Relying Parties.
- On the My Relying Parties page, click Add a Relying Party.
- On the Relying Party Catalog page, click Add for Microsoft Entra ID.
- On the Basic Information page, enter a name for the Microsoft Entra ID Relying Party instance in the Name field.
- Click Next Step.
- On the Authentication page, select the policy that you have configured, and click Next Step. Make sure the selected policy does not show Authentication Options of Password or Emergency Access Code.
- On the Connection Profile page, provide the following details:
- For commercial customers:
- Client ID: Provide a name. The same name should be used while configuring Microsoft Entra ID. Copy and save this ID to be configured on the Entra ID side.
- Relying Party Issuer URL: https://login.microsoftonline.com/<ENTRA-TENANT-ID>/v2.0
Replace <ENTRA-TENANT-ID> with your Entra tenant ID - Entra ID Application ID: c2da08c7-f3ba-4323-8b8f-3496a0e40c7e
- For GCC High customers:
- Client ID: Provide a name. The same name should be used while configuring Microsoft Entra ID. Copy and save this ID to be configured on the Entra ID side.
- Relying Party Issuer URL: https://login.microsoftonline.us /<ENTRA-TENANT-ID>/v2.0
Replace <ENTRA-TENANT-ID> with your Entra tenant ID. - Entra ID Application ID: b89e878f-b207-46aa-8973-ecbf60856dce
- For commercial customers:
- Note down the Authorization Server Issuer URL that will be used on the Entra side configurations.
- Click Save and Finish.
- Click Publish Changes.
Notes
Make sure an identity source is added before creating an access policy. Any identity type can be added, but the users in RSA should have the same e-mail address as the users in Entra ID.
Configure Microsoft Entra ID
Configure Authentication Method
- Log in to Microsoft Entra Admin center.
- Select Authentication methods.
- Click Add external method.
- Provide the following values.
- For commercial customers:
- Name: Provide a name.
- Client ID: Provide the same value used in the RSA configuration.
- Discovery endpoint URL: <Authorization Server Issuer URL> /. well-known/openid-configuration
- App ID: c2da08c7-f3ba-4323-8b8f-3496a0e40c7e
- For GCC High customers:
- Name: Provide a name.
- Client ID: Provide the same value used in the RSA configuration.
- Discovery endpoint URL: <Authorization Server Issuer URL> /. well-known/openid-configuration
- App ID: b89e878f-b207-46aa-8973-ecbf60856dce
- For commercial customers:
- Add the target, enable the External authentication method, and provide the consent.
Configure Conditional Access Policy
Procedure
- Log in to Microsoft Entra Admin center.
- Select Conditional Access.
- Click Create new policy.
- On the resulting page, click Grant, choose Grant access, and select the Require multifactor authentication checkbox.
- Verify the Target resources and create the policy
Notes
- Avoid multiple conditional policies with the same Target resource.
- Authorization Server Issuer URL can be obtained from the configuration done on the RSA side. Refer to the Configure RSA Cloud Authentication Service as Relying Party section.
The configuration is complete.
Return to Microsoft Entra ID External Authentication Methods (EAM) - RSA Ready Implementation Guide.
Related Articles
Microsoft Entra ID External Authentication Methods (EAM) - RSA Ready Implementation Guide 540Number of Views Microsoft Entra ID - SCIM Client for Cloud Authentication Service - RSA Ready Implementation Guide 522Number of Views Microsoft Entra ID Custom Controls - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 187Number of Views Microsoft Entra ID - RSA Ready Implementation Guide 244Number of Views Microsoft Entra ID Custom Controls - RSA Ready Implementation Guide 52Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) How to factory reset an RSA Authentication Manager 8.x hardware appliance without a factory reset button from the Operatio… Deploying RSA Authenticator 6.2.2 for Windows Using DISM Artifacts to gather in RSA Identity Governance & Lifecycle