OPSWAT MetaDefender Core - SAML My Page SSO Configuration - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.Procedure
- Sign in to the RSA Cloud Administration Console with administrator credentials.
- Enable SSO on the My Page portal by accessing the RSA Cloud Administration Console > Access > My Page > Single Sign-On (SSO). Ensure it is enabled and protected by two-factor authentication using a Password and Access Policy.
- On the Applications > Application Catalog page, click on Create From Template.
- On the Choose Connector Template page, click Select for SAML Direct.
- On the Basic Information page, enter a name for the configuration in the Name field and click Next Step.
- In the Connection Profile section, select IdP-initiated option.
- Provide the Service Provider details in the following format:
- Assertion Consumer Service (ACS) URL: <OPSWAT MetaDefender Core Login URL>
- Service Provider Entity ID: <OPSWAT MetaDefender Core Login URL>
Refer to the OPSWAT MetaDefender Core configuration section to obtain MetaDefender Login URL.
- In the SAML Response Protection section, select IdP signs assertion within response, and download the certificate by clicking Download Certificate.
- Under the User Identity section, select Show Advanced Configuration, then configure Identifier Type and Property as follows:
- Identifier Type: transient
- Property: Auto Detect
- Under the Statement Attribute section, add the following attributes:
- Attribute Name: mail
- Attribute Source: Identity Source
- Property: mail
Note: Ensure this attribute is configured on the MetaDefender side. Refer to the MetaDefender configuration section for more details.
- Click Next Step.
- Choose your desired Access Policy for this application and click Next Step > Save and Finish.
- On the My Applications page, click the Edit dropdown and select Export Metadata to download the metadata.
- Click Publish Changes to save your settings. After publishing, your application will be enabled for SSO.
Configure OPSWAT MetaDefender Core
Perform these steps to configure OPSWAT MetaDefender Core.Procedure
- Log in to OPSWAT MetaDefender Core using admin credentials.
- Select User Management from the left pane.
- Select Directories tab and click Add directory.
- Perform the following actions:
- Directory type: Select the SAML radio button.
- Name: Enter the Identity Provide Name.
- Identity Provider: Select Submit JSON and upload the metadata file downloaded from the RSA platform.
- In the Service Provider section do the following:
- Check the Use custom entity ID checkbox and provide a unique Custom entity ID.
- Check the Sign in MetaDefender Core via Identity Provider site checkbox to enable SSO via IdP flow.
- Provide the following details and click Save changes:
- Host or IP: 'http://<IP address>:<8008 >' (Ensure this URL includes the correct IP address and port number. Typically, the port number is 8008 where MetaDefender Core is hosted).
- Login URL: Copy the Login URL used as ACS URL in RSA platform for configuration.
- User identified by: Add the user attributes for mapping as required in the following format ${<attribute_name>}. For this configuration, ${mail} is used.
- Toggle the switch highlighted in the figure below to enable the configuration for the newly added directory.
- Click Enable.
The configuration is complete.
Return to OPSWAT MetaDefender Core - RSA Ready Implementation Guide
Related Articles
Microsoft Entra ID - SAML My Page SSO Configuration - RSA Ready Implementation Guide 206Number of Views Palo Alto NGFW Global Protect - SAML My Page SSO Configuration - RSA Ready Implementation Guide 43Number of Views Salesforce - SAML My Page SSO Configuration - RSA Ready Implementation Guide 66Number of Views Microsoft Office 365 - SAML My Page SSO Configuration - RSA Ready Implementation Guide 118Number of Views AWS IAM - SAML My Page SSO Configuration - RSA Ready Implementation Guide 34Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) How to factory reset an RSA Authentication Manager 8.x hardware appliance without a factory reset button from the Operatio… Deploying RSA Authenticator 6.2.2 for Windows Using DISM Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?