Ping Identity PingFederate 9.3 - Configure Bridge between RSA SecurID Access SAML IdP and Partner Service Providers Configuration - RSA Ready SecurID Access Implementation Guide
2 years ago
Originally Published: 2020-01-27

Follow the instruction steps in this section to apply your SSO Agent and Relying Party configuration to Ping Identity PingFederate Bridge between RSA SecurID Access SAML IdP and Partner Service Providers.

 

Before you begin: Configure the integration type that your use case will employ. Refer to the Integration Configuration Summary section for more information.

Procedure

<ENTER STEPS TO CONFIGURE HERE>

1. On the Target Session Mapping page, click Map New Authentication Policy button.

sso-cas-relparty-pingfed-step13.png

2. On the Authentication Policy Contract page, click the Manage Authentication Policy Contracts button.

use-case-2-step2.png

3. On the Manage Authentication Policy Contracts page, click Create New Contract button.

use-case-2-step3.png

4. On the Contract Info page, enter CONTRACT NAME and click Next.

use-case-2-step4.png

5. On the Contract Attributes page, click Next.

use-case-2-step5.png

6. On the Summary Page, click Done.

use-case-2-step6.png

7. On the Manage Authentication Policy Contracts page, click Save.

use-case-2-step7.png

8. On the Authentication Policy Contract page, select the contract created above from the AUTHENTICATION POLICY CONTRACT drop-down.

use-case-2-step8.png

9. On the Attribute Retrieval page, click the radio button for USE ONLY THE ATTRIBUTES AVAILABLE IN THE SSO ASSERTION and click Next.

USe-case-2-step9.png

10. On the Contract Fulfillment page, select Assertion from the Source drop-down menu, SAML_SUBJECT from the Value drop-down menu and click Next.

use-case-2-step10.png

11. On the Issuance Criteria page, click Next.

use-case-2-step11.png

12. On the Summary page, review the information and click Done.

use-case-2-step12.png

13. On the Target Session Mapping page, click Next.

sso-cas-relparty-pingfed-step27.png

14. On the Summary page, review the information and click Done.

sso-cas-relparty-pingfed-step28_624x390.png

15. On the User-Session Creation page, click Next.

sso-cas-relparty-pingfed-step29.png

16. On the Protocol Settings page, click Configure Protocol Settings button.

sso-cas-relparty-pingfed-step30.png

17. On the SSO Service URLs page, click Next.

sso-cas-relparty-pingfed-step31.png

18. On the Allowable SAML Bindings page, check the POST and REDIRECT check-boxes only and click Next.

sso-cas-relparty-pingfed-step32.png

Note:  RSA SecurID Access does not support ARTIFACT and SOAP SAML binding methods.

19. On the Overrides page, click Next.

sso-cas-relparty-pingfed-step33.png

20. On the Signature Policy page, select the USE SAML-STANDARD SIGNATURE REQUIREMENTS radio button and click Next.

sso-cas-relparty-pingfed-step34.png

21. On the Encryption Policy page, select the NONE radio button and click Next.

sso-cas-relparty-pingfed-step35.png

22. On the Summary page, review the information and click Done.

sso-cas-relparty-pingfed-step36.png

23. On the Protocol Settings page, review the information and click Next.

sso-cas-relparty-pingfed-step37.png

24. On the Summary page, review the information and click Done.

sso-cas-relparty-pingfed-step38.png

25. On the Browser SSO page, click Next.

sso-cas-relparty-pingfed-step39.png

26. On the Credentials page, click Next.

sso-cas-relparty-pingfed-step40.png

27. On the Activation & Summary page, toggle the Connection Status to Active, make note of the SSO Application Endpoint URL and click Save.

sso-cas-relparty-pingfed-step41.png

28. On the Service Provider page, under IDP CONNECTIONS, click Manage All button.

sso-cas-relparty-pingfed-step42.png

29. On the IdP Connections page, locate the IdP Connection just created, open the Select Action menu and click Export Metadata.

sso-cas-relparty-pingfed-step43.png

Note:  If you had set temporary placeholder values during the RSA SecurID Access SAML IdP configuration, then go back and replace them using the PingFederate SAML SP metadata file.

 

30. In the PingFederate administrative web console, open the Identity Provider tab and click to open the 3rd party application SAML SP connection.

use-case-2-step30.png

31. Scroll down to the Assertion Creation section and click Authentication Source Mapping.

use-case-2-step31.png

32. On the Authentication Source Mapping page, click Map New Authentication Policy button.

use-case-2-step32.png

33. On the Authentication Policy Contract page, choose the contract created above from the AUTHENTICATION POLICY CONTRACT drop-down menu and click Next.

use-case-2-step33.png

34. On the Mapping Method page, click Next.

use-case-2-step34.png

35. On the Attribute Contract Fulfillment page, choose Authentication Policy Contract from the Source drop-down menu and subject from the Value drop-down menu. Then click Next.

use-case-2-step35.png

36. On the Issuance Criteria page, click Next.

37. On the Summary page, review the information and click Save.

use-case-2-step37.png

38. In the PingFederate administrative web console, open the Identity Provider or Service Provider tab and click Policies.

use-case-2-step38_624x318.png

39. On the Policy page, toggle the button to enable the policy contract created above and configure the authentication policy as shown below:

  1. The first Action branch is configured to HTML form authentication method.
  2. The second Action branch is configured to use RSA SecurID Access IdP connection.
  3. The third Action branch is configured to use an Authentication Policy Contract to take attributes from the IdP connection and send them to the created SAML SP.

use-case-2-step39.png

40. Click Options on the IdP Connection (second Action branch).

41. On the Incoming User ID pop-up, choose the Adapter from the Source drop-down menu and username from the Attribute drop-down and click Done.

use-case-2-step41.png

42. Click Contract Mapping on the Policy Contract (third Action branch).

use-case-2-step42.png

43. On the Attribute Sources & User Lookup page, click Next.

use-case-2-step43.png

44. On the Contract Fulfillment page, choose the IdP Connection from the Source drop-down menu and choose SAML_SUBJECT from the Value drop-down menu and click Next.

use-case-2-step44.png

45. On the Issuance Criteria page, click Next.

use-case-2-step45.png

46. On the Summary page, review the information and click Done.

use-case-2-step46.png

47. On the Policy page, click Done.

use-case-2-step47.png

 

Configuration is complete.

User Experience

Login Screen (AM or Cloud) user-ex-1-login-scr.png
User-defined New PIN (AM) user-ex-2-userdef-newpin.png
System generated New PIN (AM) user-ex-3-sysgen-newpin.png
Next Tokencode (AM) user-ex-4-nexttoken-scr.png

 

Return to the main page for more certification related information.