Orca Security - SAML Relying Party Configuration - RSA Ready Implementation Guide
2 years ago
This article describes how to integrate RSA Cloud Authentication Service with Orca Security using SAML Relying Party.
   

Configure RSA Cloud Authentication Service

Perform these steps to configure RSA Cloud Authentication Service. 
Procedure
  1. Sign in to RSA Cloud Administration Console. 
  2. Click Authentication ClientsRelying Parties.                                                                                                                                             image.png
  3. On the Relying Party Catalog page, click Add a Relying Party and click Add for Service Provider SAML.                                          image.png
  4. On the Basic Information page, enter the name for the application in the Name field and click Next Step.                                             image.png
  5. On the Authentication page, choose SecurID manages all authentication.
  6. Select a Primary Authentication Method and Access Policy as required and click Next Step.                                                          image.png
  7. Scroll down to the Service Provider section and enter below details:
    1. ACS URL: https://app.us.orcasecurity.io/api/sso/acs/ <Account_id> 
    2. Service Provider Entity ID: Same as ACS URL.                                                                                                                               image.png     
  8. In the SAML Response Protection section, choose IdP signs assertion within response.
  9. Download the certificate by clicking Download Certificate.                                                                                                                       image.png
  10. Click Show Advanced Configuration.
  11. Under the User Identity section, configure Identifier Type as Email Address and Property as mail.                                                   image.png
  12. Under the Statement Attributes section, add the following attributes.
    1. Attribute Name: FirstName, Attribute Source: Identity Source, Property: givenName
    2. Attribute Name: LastName, Attribute Source: Identity Source, Property: sn
    3. Attribute Name: Email, Attribute Source: Identity Source, Property: mail                                                                                      image.png
  13. Click Save and Finish.
  14. On the My Relying Parties page, click the Edit drop-down icon and select the Metadata option to download the metadata.
  15. Click Publish Changes. Your application is now enabled for SSO.                                                                                                              image.png      image.png
  

Configure Orca Security

Perform these steps to configure Orca Security.
Procedure 
  1. Log on to Orca Security with administrator credentials.
  2. In the left pane on the home page, click Settings.                                                                                                                                          image.png
  3. In the left pane, click Integrations.                                                                                                                                                                   image.png
  4. Under SSO, click Configure.                                                                                                                                                                        image.png
  5. Provide the following details:
    1. Account ID: A string identifying the Orca Security tenant used for RSA configuration.
    2. SSO Endpoint URL: The SingleSignOnService value that can be obtained from the metadata file downloaded from RSA.
    3. Issuer: The entityID value that can be obtained from the metadata file downloaded from RSA.
    4. X509 Public Certificate: The certificate downloaded from RSA. 
  6. Make sure that SSO is enabled.
  7. Click Save.                                                                                                                                                                                                      image.png
The configuration is complete.
Return to Orca Security - RSA Ready Implementation Guide.