MyWebTimesheets - SAML Relying Party Configuration - SecurID Access Implementation Guide
2 years ago
Originally Published: 2021-08-24

MyWebTimesheets - SAML Relying Party Configuration - SecurID Access Implementation Guide

This section describes how to integrate SecurID Access with MyWebTimesheets using Relying Party. Relying party uses SAML 2.0 to integrate SecurID Access as a SAML Identity Provider (IdP) to MyWebTimesheets SAML Service Provider (SP).

Architecture Diagram

Admin_Dharani_0-1629837793107.png

 

Configure SecurID Access Cloud Authentication Service

Perform these steps to configure SecurID Access Cloud Authentication Service as a relying party SAML IdP to MyWebTimesheets .

Procedure

  1. Sign into the SecurID Cloud Administration Console and browse to Authentication Clients > Relying Parties and click Add a Relying Party.

    Admin_Dharani_1-1629838003883.png

     

    Admin_Dharani_2-1629838034861.png

     

  2. On Basic Information page enter a Name for the application, ie. MyWebTimesheets Then click on Next Step.

  3. On Authentication page

    1. select the RSA SecurID Access manages all authentication

    2. Select the desired Primary Authentication Method from the dropdown list. i.e Password

    3. Select the desired policy from the Access Policy for Additional Authentication.

    4. Click Next Step

      Admin_Dharani_3-1629838305701.png

       

  4. On Connection Profile page

    1. Enter the Assertion Consumer Service (ACS) with the value of the Consumer Service URL (ACS) in the MyWebTimesheets configuration below. For example, https://VAGCDS.MyWebTimesheets.com/samllogin.aspx.

    2. Enter the Service Provider Entity ID with the value of the EntityID in the MyWebTimesheets configuration below. For example, https://VAGCDS.MyWebTimesheets.com.

    3. Under Message Protection click on the Download Certificate. The certificate will be used in the MyWebTimesheets configuration below.

    4. Open Advanced Configuration section and note the Identity Provider Entity ID field . For Example :https://rsa-blr-pe.auth-demo.securid.com/saml-fe/sso.

    5. Click on Save and Finish.

      Admin_Dharani_4-1629838451524.png

       

  5. Browse to Authentication Clients > Relying Parties

  6. Click on Publish Changes. Your application is now enabled for SSO. If you make any additional changes to the application configuration you will need to republish.

    Admin_Dharani_5-1629838523117.png

     

Configure MyWebTimesheets

Perform these steps to integrate MyWebTimesheets with SecurID Access as a SAML SSO Agent.

Procedure

  1. Sign into MyWebTimesheets as Admin and browse to Settings > Security Management > Company SAML Settings.

  2. In the SAML Configuration, note the Consumer Service URL (ACS) and EntityID they are used above in the SecurID Access Cloud Authentication Service  configuration above.

  3. For the SAML Settings select Edit button.

  4. Enter for Login URL from the Identity Provider Entity ID value obtained above. For example, https://rsa-blr-pe.auth-demo.securid.com/saml-fe/sso.

  5. For Certificate copy and paste the certificate downloaded in Cloud Authentication Service Configuration above.

  6. For Is Enable select Yes.

  7. Click on Save.

 

Next Step: See main page for more certification information.