MyWebTimesheets - SAML Relying Party Configuration - SecurID Access Implementation Guide
This section describes how to integrate SecurID Access with MyWebTimesheets using Relying Party. Relying party uses SAML 2.0 to integrate SecurID Access as a SAML Identity Provider (IdP) to MyWebTimesheets SAML Service Provider (SP).
Architecture Diagram
Configure SecurID Access Cloud Authentication Service
Perform these steps to configure SecurID Access Cloud Authentication Service as a relying party SAML IdP to MyWebTimesheets .
Procedure
-
Sign into the SecurID Cloud Administration Console and browse to Authentication Clients > Relying Parties and click Add a Relying Party.
-
On Basic Information page enter a Name for the application, ie. MyWebTimesheets Then click on Next Step.
-
On Authentication page
-
select the RSA SecurID Access manages all authentication
-
Select the desired Primary Authentication Method from the dropdown list. i.e Password
-
Select the desired policy from the Access Policy for Additional Authentication.
-
Click Next Step
-
-
On Connection Profile page
-
Enter the Assertion Consumer Service (ACS) with the value of the Consumer Service URL (ACS) in the MyWebTimesheets configuration below. For example, https://VAGCDS.MyWebTimesheets.com/samllogin.aspx.
-
Enter the Service Provider Entity ID with the value of the EntityID in the MyWebTimesheets configuration below. For example, https://VAGCDS.MyWebTimesheets.com.
-
Under Message Protection click on the Download Certificate. The certificate will be used in the MyWebTimesheets configuration below.
-
Open Advanced Configuration section and note the Identity Provider Entity ID field . For Example :https://rsa-blr-pe.auth-demo.securid.com/saml-fe/sso.
-
Click on Save and Finish.
-
-
Browse to Authentication Clients > Relying Parties
-
Click on Publish Changes. Your application is now enabled for SSO. If you make any additional changes to the application configuration you will need to republish.
Configure MyWebTimesheets
Perform these steps to integrate MyWebTimesheets with SecurID Access as a SAML SSO Agent.
Procedure
-
Sign into MyWebTimesheets as Admin and browse to Settings > Security Management > Company SAML Settings.
-
In the SAML Configuration, note the Consumer Service URL (ACS) and EntityID they are used above in the SecurID Access Cloud Authentication Service configuration above.
-
For the SAML Settings select Edit button.
-
Enter for Login URL from the Identity Provider Entity ID value obtained above. For example, https://rsa-blr-pe.auth-demo.securid.com/saml-fe/sso.
-
For Certificate copy and paste the certificate downloaded in Cloud Authentication Service Configuration above.
-
For Is Enable select Yes.
-
Click on Save.
Next Step: See main page for more certification information.
Related Articles
Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 243Number of Views Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 502Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views Workday - SAML Relying Party Configuration - RSA Ready Implementation Guide 4Number of Views Okta - SAML Relying Party Configuration - RSA Ready Implementation Guide 45Number of Views
Trending Articles
Downloading RSA Authentication Manager license files or RSA Software token seed records Unable to login to RSA Authentication Manager Security Console as super admin RSA Authentication Manager 8.9 Release Notes (January 2026) How to manipulate imported RSA SecurID Software Token(s) on an iPhone or iPad device Connection fails to Cloud Authentication Service when connecting through a proxy server from RSA Authentication Manager to…