Microsoft Office 365 - SAML IDR SSO Configuration - RSA Ready Implementation Guide
This article describes how to integrate Microsoft Office 365 with Cloud Access Service (CAS) using IDR SSO.
Configure CAS
Perform these steps to configure CAS as an IDR SSO to Microsoft Office 365.
Procedure
- Sign in to the RSA Cloud Administration Console.
- Navigate to Applications > Application Catalog page, search for Microsoft Office 365, and click Add to add connector.
- On the Basic Information page, enter the name for the application in the Name field.
- Choose Identity Router and click Next Step.
- In the Connection Profile section, select IdP-initiated option.
- Enter Connection URL: https://login.microsoftonline.com/login.srf.
- In the Identity Provider section:
- Note the Identity Provider URL as it will be required in the Microsoft O365 configuration.
- Keep the Identity Provider Entity ID unchanged as it remains the default setting.
- You must import a private/public key pair to sign and validate SAML assertions. If you do not have one readily available, follow the steps to generate a certificate bundle. Otherwise, continue to the next step.
- Click the Generate Certificate Bundle in the SAML Response Signature section.
- Enter a common name for your Identity Router domain in the Common Name (CN) field.
- Click Generate and Download, save the certificate bundle ZIP file to a secure location, and extract its contents. The ZIP file will contain a private key, a public certificate, and a certificate signing request.
- Provide the Service Provider details in the following format:
- Assertion Consumer Service (ACS) URL: Enter the Microsoft ACS URL “https://login.microsoftonline.com/login.srf”.
- Service Provider Entity ID: Enter the Microsoft Issuer "urn:federation:MicrosoftOnline".
- Under the User Identity section, configure Identifier Type, Identity Source, and Property as follows:
- Identifier Type: persistent
- Identity Source: Select your Identity Source
- Property: objectGUID
- Under the Attributes Extension section, add the following attributes:
- First attribute:
- Attribute Source: Identity Source
- Attribute Name: IDPEmail
- Identity Source: Select the identity source that will be used.
- Property: Select the email attribute in your user directory from the drop-down list (for example, 'mail')
- Second attribute:
- Attribute Source: Identity Source
- Attribute Name: ImmutableID
- Identity Source: Select the identity source that will be used.
- Property: Select the property used for object GUID attribute in your user directory from the drop-down list (for example, 'objectGUID').
- First attribute:
- Click Next Step.
- On the User Access page, select the access policy the identity router will use to determine which users can access the Microsoft O365 service provider and click Next Step.
- On the Portal Display page, configure the portal display and other settings.
- Click Save and Finish.
- Click Publish Changes and wait for the operation to complete.
After publishing, your application is enabled for SSO.
Configure Microsoft Office 365
Perform these steps to configure Microsoft Office 365.
Procedure
- Log in to Microsoft Office 365 with admin credentials at https://office.com.
- Click the Admin icon in the sidebar.
You will be redirected to the Microsoft 365 admin center. - Go to Settings > Domains to verify your custom domain name.
- After your domain is verified, click Identity in the navigation menu on the left. The Microsoft Entra admin center page will open automatically.
- Under Identity > Settings > Domain names, ensure that the domain previously entered is listed on the custom domain names page. If not, click Add Custom Domain to verify your domain.
- Run Windows PowerShell as an administrator.
- Connect to your Office 365 using the command: Connect-MsolService.
- Log in with your Office 365 tenant administrator account.
Note: This admin account should be in a separate domain from the one that will be federated (for example, a member of the default domain provided by Microsoft).
- Retrieve all domains for the company (verified or unverified) to identify the domain that should be federated using the command: Get-MsolDomain.
- Run the following script in a PowerShell environment. Most of the values come from RSA Cloud Authentication Service configuration section:
- $domain: Enter the domain for which you would like to enable SSO.
- $BrandName: Enter a name to identify your IdP (for example, RSA SAML).
- $LogOnUrl: Enter the Identity Provider URL used in the RSA Cloud Authentication Service configuration.
- $LogOffUrl: Enter the landing page URL when the user logs out (for example, https://login.microsoftonline.com/login.srf)
- $SigningCert: Follow these steps to configure the signing certificate and set the $SigningCert variable:
- Download the certificate and save it to a folder, for example, C:\Users\my.name\Downloads.
- Use these PowerShell commands to process the certificate and set the $SigningCert variable:
Note that if typing the command manually, the character in "`r|`n" is a backtick (not a single quote). - Verify the content of $SigningCert by typing it at the PowerShell prompt to ensure it contains the correct Base64-encoded certificate string. This method avoids manual editing and reduces the chance of error.
- $uri: Enter the Identity Provider URL value used in the RSA Cloud Authentication Service configuration.
- $Protocol: SAMLP
- After defining the parameters, run the following command. A successful run of the command should not return any errors.
- To verify if the domain is configured to use SAML, use the following command with your domain. The result should show the same values as used in the preceding script variable.
- All the users authenticated by SAML must have an immutableID set. Users without an ImmutableID cannot log in. To identify users without an immutableID set, run the following PowerShell command.
Test Your Application Integration
- Go to the Office 365 login page and enter the e-mail of a test user who utilizes the newly federated domain to be redirected to the login portal.
- Enter your User ID and Password.
After successful authentication, you will be redirected to your Office 365 landing page.
Notes:
- Make sure you have the MSOnline PowerShell module installed by using Install-Module -Name MSOnline.
- Office 365 SSO can be enabled only for domains that are verified in Microsoft Entra ID.
- Office 365 SSO cannot be enabled for “onmicrosoft.com” domains that are created by Microsoft.
- If your organization does not have a custom Office 365 domain, you need to purchase one to configure SSO. Federated domains, which are domains where SSO has been enabled, cannot be configured for password synchronization.
- The backtick used when setting the signing certificate is normally located to the left of the "1" key on your keyboard.
- To modify any configuration settings made in Windows PowerShell after federating the necessary domain, use the command Set-MsolDomainFederationSettings instead of Set-MsolDomainAuthentication as the domain is already federated.
- To revert to non-federated authentication, use the following command: Set-MsolDomainAuthentication –DomainName $domain –Authentication Managed.
The configuration is complete.
Return to Microsoft Office 365 - RSA Ready Implementation Guide
Related Articles
Microsoft 365 - SAML and SCIM My Page SSO Configuration - RSA Ready Implementation Guide 35Number of Views How to back up the SAML configuration in RSA Federated Identity Manager (FIM) 2.0 24Number of Views Microsoft Office 365 - SAML My Page SSO Configuration - RSA Ready Implementation Guide 117Number of Views Microsoft Sentinel as SIEM for RSA Admin Logs Using Logic Apps - RSA Ready Implementation Guide 4Number of Views Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 234Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide
Don't see what you're looking for?