Okta - SAML My Page SSO Configuration - RSA Ready Implementation Guide
Originally Published: 2021-11-07
This section describes how to configure Okta with RSA Cloud Authentication Service using my page SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console and navigate to Applications > Application Catalog. Click Create From Template and select SAML Direct.
- Choose Cloud on the Basic Information page.
- Enter the name for the application and click the Next Step button.
- On the Connection Profile page, Navigate to Initiate SAML Workflow section and choose IdP-initiated.
- In Data Input Method, select Import Metadata file from Okta to populate the Assertion Consumer Service URL value and Service Provider Entity ID.
- Scroll down to the Identity Provider section. Make a note of the Identity Provider URL, as it will be needed for the OKTA configuration.
- Under the Message Protection section, for SAML Response Protection:
-
- Select IdP signs assertion with response.
- Scroll down to the User Identity section and select the following:
- Identifier Type – emailAddress
- Property – mail
- Click Next Step, select Allow All Authenticated Users, from the drop down select the policy for this application.
- On the Portal Display page, select Display in Portal. Click Next step.
- Enter Fulfilment details as shown below.
- Locate the application just created in My Applications page and click the dropdown arrow next to Edit > Export Metadata.
- Click Publish Changes. After publishing, your application is now enabled for SSO.
The configuration is complete.
OKTA Configuration
Perform these steps to configure OKTA.
Procedure
- Log in to Okta with the admin account, browse to the Security > Identity Providers > Add Identity provider.
- Select the Identity Provider as SAML 2.0 click Next.
- Provide the name details to configure General settings.
- Select IdP Usage as SSO only and select the checkbox for Account matching with Persistent Name ID.
- Provide details in the Account matching with IdP Username section.
-
- Select the idpuser.subjectNameID from drop down for IDP username.
- Match against field select the Email from drop down.
- If no match is found select the check box Redirec to Okta Sign-in page.
- Provide the following details in the SAML Protocol Setting section:
-
- IdP Issuer URI - Obtain from the metadata file downloaded from RSA.
- IdP Single Sign-On URL - Obtain from the metadata file downloaded from RSA.
- IdP Signature Certificate – Upload the downloaded certificate from RSA.
- Request Binding – Select HTTP POST.
- Provide the details as shown in the following figure and click Finish.
-
- Request Signature select the check box Sign SAML Authentication requests.
- Request Signature Algorithm select the SHA-256 from the drop down list.
- Destination Specify the destination RSA URL.
8. Navigate to the Identity Providers section and click Add Routing Rule under the Routing rules tab.
9. Provide the Rule name, select the IdP as Okta under IdPs, and click Create rule.
The configuration is complete.
Related Articles
How to SecurID-protect OWA using single sign-on (SSO) when OWA is in a cluster 203Number of Views RSA Identity Governance and Lifecycle SAML SSO failing with error "Did not find user with attribute" 210Number of Views An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x 1.16KNumber of Views RSA Identity Management & Governance AuthRequest asking for a transient ID in SAML SSO integration 195Number of Views RSA Announces Availability of RSA Authentication Manager 8.4 Language Packs 6Number of Views
Trending Articles
An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process
Don't see what you're looking for?