Orca Security - SAML IDR SSO Configuration - RSA Ready Implementation Guide
2 years ago
This article describes how to integrate Orca Security with RSA Cloud Authentication Service using SAML IDR SSO.
   

Configure RSA Cloud Authentication Service

Perform these steps to configure RSA Cloud Authentication Service using IDR SSO.
Procedure
  1. Sign in to RSA Cloud Administration Console.
  2. Navigate to Applications > Application Catalog page and click Create From Template.                                                                                  image.png
  3. Click Select for SAML Direct.                                                                                                                                                                        image.png
  4. On the Basic Information page, enter the name for the application in the Name field and click Next Step.
  5. Choose Identity Router in the Basic Information section and select Next Step.                                                                                     image.png
  6. In the Initiate SAML Workflow section, choose IdP-initiated.
  7. Scroll down to the SAML Identity Provider (Issuer) section.                                                                                                                        image.png
    1. Identity Provider URL is automatically generated. 
    2. Identity Provider Entity ID is automatically generated.
    3. Click Generate Cert Bundle and set a common name for your company certificate.
    4. Click Generate and Download.
    5. Click Choose File and upload the private key from the generated certificate bundle.
    6. Click Choose File and upload the cert from the generated certificate bundle. 
  8. Scroll down to the Service Provider section and enter the following details:
    1. ACS URL: https://app.us.orcasecurity.io/api/sso/acs/ <Account_id>
    2. Service Provider Entity ID: Same as ACS URL.
      Refer to step 5 in the Configure Orca Security section for details to obtain the Account ID.                                                            image.png
  9. Scroll down to the User Identity section and select the following:
    1. Identifier Type – Email Address
    2. Identity Source – select your user identity source.
    3. Property – mail                                                                                                                                                                                 image.png
  10. Under the Statement Attributes section, add the following attributes.
    1. Attribute Name: FirstName, Attribute Source: Identity Source, Property: givenName
    2. Attribute Name: LastName, Attribute Source: Identity Source, Property: sn
    3. Attribute Name: Email, Attribute Source: Identity Source, Property: mail                                                                                        image.png
  11. On the User Access page, select the access policy that the identity router will use to determine which users can access the application.   image.png
  12. Click Next Step.
  13. On the Portal Display page, configure the portal display and other settings and click Save and Finish
  14. On the My Applications page, click the Edit drop-down icon and select Export Metadata to download the metadata.
  15. Click Publish Changes.                                                                                                                                                                          image.png   image.png
    

Configure Orca Security

Perform these steps to configure Orca Security.
Procedure 
  1. Log on to Orca Security with administrator credentials.
  2. In the left pane of the home page, click Settings.                                                                                                                                             image.png
  3. In the left pane, click Integrations.                                                                                                                                                               image.png
  4. Under SSO, click Configure.                                                                                                                                                                            image.png
  5. Provide the following details:
    1. Account ID: A string identifying the Orca Security tenant used for RSA configuration.
    2. SSO Endpoint URL: The Identity Provider URL obtained from RSA.
    3. Issuer: The Identity Provider Entity ID obtained from RSA.
    4. X509 Public Certificate: The certificate downloaded from RSA.
  6. Make sure that SSO is enabled.
  7. Click Save.                                                                                                                                                 image.png
The configuration is complete.
Return to Orca Security - RSA Ready Implementation Guide