This section describes how to integrate PingFederate with RSA Cloud Authentication Service using My Page SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console and go to Applications > Application Catalog, search for Ping Identity PingFederate and click Add to add the connector.
- Choose Cloud on the Basic Information page.
- Enter the name for the application and click Next Step.
- On the Connection Profile page, Navigate to Initiate SAML Workflow section and choose IdP-initiated.
- Go to the Service Provider section and enter below details:
- ACS URL: It will be in this format https://<BASE_URL>/sp/ACS.saml2. This represents the base URL of the PingFederate server. Replace <BASE_URL> with the actual domain of your PingFederate setup.
- Audience (Service Provider Entity ID): The format will be <SAML 2.0 ENTITY ID> which can be retrieved from the PingFederate administrative console. Refer to the notes for detailed steps.
Note: If ACS URL and Audience are not known, enter temporary place holder values so that you can continue. After you complete the PingFederate SP configuration and export its metadata, you can import it to fill these values automatically.
- Scroll down to the Identity Provider section. Make a note of the Identity Provider URL, as it will be required for the PingFederate configuration.
- On the User Identity section, select the following options:
- Identifier Type – emailAddress
- Property – mail
- Click Next Step.
- On the User Access page, select the access policy the identity router will use to determine which users can access the application.
- Click Next Step.
- On the Portal Display page, configure the portal display and other settings. Then click Next Step.
- On the Fulfillment page, configure your preferred settings or leave the Fulfillment toggle button disabled as it is, then click Save and Finish.
- Locate the application created in My Applications page and click the dropdown arrow next to Edit > Export Metadata.
- Click Publish Changes and wait for the operation to be completed.
- After publishing, your application is now enabled for SSO.
Configure PingFederate
Perform these steps to configure PingFederate.
- In the PingFederate administrative console, go to Authentication > Integration > IdP Connections, and then click Create Connection.
- On the Connection Type tab, select Browser SSO Profiles, and in the Protocol list, select SAML 2.0. Click Next.
- On the Connection Options tab, click Next.
- On the Import Metadata tab, click File, and then click Choose File.
- Locate and select metadata file from the RSA Cloud Authentication Service configuration, click Open, and click Next to proceed.
- On the Metadata Summary tab, click Next.
- On the General Info tab, The General Info tab is filled out by the metadata. Review the Partner’s Entity ID and Connection Name. Click Next.
- On the Browser SSO tab, click Configure Browser SSO.
- On the SAML Profiles tab, check the IDP-Initiated SSO and the SP-Initiated SSO checkboxes, and click Next.
- On the User-Session Creation tab, click Configure User-Session Creation.
- On the Identity Mapping tab, click Account Mapping and then click Next.
- On the Attribute Contract tab, click Next.
Note: From this point onward, the configuration process splits into two distinct paths. Choose one path from each configuration based on your specific needs to proceed.
Configure Using an Adapter Instance
Perform these steps to configure PingFederate using Adapter Instance.
- On the Target Session Mapping tab, click Map New Adapter Instance.
- On the Adapter Instance tab, click the Manage Adapter Instances button.
- On the SP Adapters page, click Create New Instance button.
- On the Type tab, enter Instance Name and Instance ID, select OpenToken SP Adapter from the Type dropdown list, and click Next.
- On the Instance Configuration tab, enter the Password and Confirm Password field values (This is used to generate the encryption key and is not referenced elsewhere), and click Next.
- On the Actions tab, click Next.
- On the Extended Contract page, click Next.
- On the Target App Info tab, leave the Application Name and URL fields blank, and click Next.
- On the Summary tab, click Save.
- On the SP Adapters page, click Done.
- On the Adapter Instance tab, from the Adapter Instance dropdown, select the adapter name created previously and click Next.
- On the Adapter Data Store tab, keep the default selection of Use only the Attributes Available in the SSO Assertion, and then click Next.
- On the Adapter Contract Fulfillment tab, set the following:
-
- Select Assertion from the Source dropdown list.
- Select SAML_SUBJECT from the Value dropdown list.
Note: These selections map the attributes from the inbound assertion to the connection attributes.
- Click Next to proceed.
- On the Issuance Criteria tab, click Next.
- To complete the adapter configuration, click Done on the Adapter Mapping Summary tab. Then, on the Target Session Mapping tab, click Next.
- Review the User-Session Creation Summary tab, and then click Done.
- On the User Session Creation tab, click Next.
- On the Protocol Settings tab, click Configure Protocol Settings.
Note: The Protocol Settings tab shows the currently configured values from the metadata.
- On the SSO Service URLs tab, review the Endpoint URLs extracted from the metadata. Click Next.
- On the Allowable SAML Bindings tab, ensure only Post and Redirect are selected, and then click Next.
- On the Overrides tab, click Next.
- On the Signature Policy tab, use the default selection of Use SAML-Standard Signature Requirements where the IdP will sign the response. Click Next.
- On the Encryption Policy tab, keep the default selection None. Click Next.
- On the Protocol Settings Summary tab, review and click Done.
- On the Protocol Settings tab, click Next.
- On the Browser SSO Summary tab, review the settings and click Done.
- On the Browser SSO tab, click Next.
- On the Credentials tab, verify the IdP signing certificate is available, and then click Next.
Note: The signing public key is included because you imported metadata.
- On the Activation and Summary tab, ensure the Connection Status is Active, make note of the SSO Application Endpoint URL, and click Save.
- On the IdP Connections page, locate the IdP Connection just created, open the Select Action list, and click Export Metadata.
Note: If temporary placeholder values were used during the RSA Cloud Authentication Service configuration, return and update them with the values from the PingFederate metadata file.
Configuration completed.
Configure using an Authentication Policy Contract
Perform these steps to configure Policy Contract
- On the Target Session Mapping tab, click Map New Authentication Policy.
- On the Authentication Policy Contract tab, click the Manage Policy Contracts button.
- On the Policy Contracts page, click Create New Contract.
- On the Contract Info tab, enter Contact Name and click Next.
- On the Contract Attributes page, click Next.
- On the Authentication Policy Contract Summary Page, click Save.
- On the Policy Contracts page, click Done.
- On the Authentication Policy Contract tab, select the contract created previously from the Authentication Policy Contract dropdown list. Click Next.
- On the Attribute Retrieval tab, select Use Only the Attributes Available in the SSO Assertion option, and click Next.
- On the Contract Fulfillment tab, set the following and then click Next:
-
- Select Assertion from the Source dropdown list.
- Select SAML_SUBJECT from the Value dropdown list.
- On the Issuance Criteria tab, click Next.
- To complete the configuration, click Done on the Authentication Policy Mapping Summary tab. Then, on the Target Session Mapping tab, click Next.
- On the User-Session Creation Summary tab, review the information and click Done to return to the User-Session Creation tab.
- On the User Session Creation tab, click Next.
- On the Protocol Settings tab, click Configure Protocol Settings.
Note: The Protocol Settings tab displays the currently configured values from the metadata.
- On the SSO Service URLs tab, review the Endpoint URLs extracted from the metadata, and click Next.
- On the Allowable SAML Bindings tab, ensure only Post and Redirect are selected, and then click Next.
- On the Overrides tab, click Next.
- On the Signature Policy tab, select Use SAML-Standard Signature Requirements where the IdP will sign the response. Then click Next.
- On the Encryption Policy tab, keep the default selection of None. Click Next.
- On the Protocol Settings Summary tab, review and click Done.
- On the Protocol Settings tab, click Next.
- On the Browser SSO Summary tab, review the settings and click Done.
- On the Browser SSO tab, click Next.
- On the Credentials tab, verify the IdP signing certificate is available, and then click Next.
Note: The signing public key was included Because you imported metadata.
- On the Activation and Summary tab, ensure the Connection Status is Active, make note of the SSO Application Endpoint URL, and click Save.
- On the IdP Connections page, locate the IdP Connection created, open the Select Action list and click Export Metadata.
Note: If temporary placeholder values were used during the RSA Cloud Authentication Service configuration, return and update them with the values from the PingFederate metadata file
- In the PingFederate administrative console, navigate to Applications > SP Connections. Click the 3rd party application SAML SP connection.
- Go to the Assertion Creation section and click Authentication Source Mapping.
- On the Authentication Source Mapping tab, click Map New Authentication Policy.
- On the Authentication Policy Contract tab, choose the contract created previously from the Authentication Policy Contract dropdown list, and click Next.
- On the Mapping Method page, click Next.
- On the Attribute Contract Fulfillment tab, choose Authentication Policy Contract from the Source drop-down menu and subject from the Value drop-down menu. Then click Next.
- On the Issuance Criteria page, click Next.
- On the Summary page, review the information and click Save.
- In the PingFederate administrative web console, navigate to Authentication > Policies and then click Add Policy.
- On the Policy page, enable the policy contract created previously.
- On the Issuance Criteria tab, click Next.
- On the Summary tab, review the information and click Done.
- On the Policy page, click Done.
- On the Policies page, click Save to complete the configuration process. Configure the authentication policy as shown in the following information:
- The first Action branch is configured to HTML form authentication method.
- The second Action branch is configured to use RSA ID Plus IdP connection previously configured.
- The third Action branch is configured to use an Authentication Policy Contract to take attributes from the IdP connection and send them to the created SAML SP.
- Click Options on the IdP Connection (second Action branch).
- On the Incoming User ID pop-up, choose the Adapter from the Source dropdown list, username from the Attribute dropdown list, and click Done.
- Click Contract Mapping on the Policy Contract (third Action branch).
- On the Attribute Sources & User Lookup page, click Next.
- On the Contract Fulfillment tab, choose the IdP Connection from the Source dropdown list, choose SAML_SUBJECT from the Value dropdown list, and click Next.
Notes
- To access and verify the required settings, go to System > Server > Protocol Settings, then under the Federation Info tab, note the Base URL used in the RSA Cloud Authentication Service configuration. Additionally, verify that the SAML 2.0 Entity ID field contains a valid and unique value, as it will also be used in the RSA Cloud Authentication Service configuration.
Configuration completed.
Related Articles
Palo Alto NGFW Global Protect - SAML My Page SSO Configuration - RSA Ready Implementation Guide 43Number of Views Salesforce - SAML My Page SSO Configuration - RSA Ready Implementation Guide 66Number of Views Microsoft Entra ID - SAML My Page SSO Configuration - RSA Ready Implementation Guide 204Number of Views SilverFort - SAML My Page SSO Configuration - RSA Ready Implementation Guide 3Number of Views Microsoft Office 365 - SAML My Page SSO Configuration - RSA Ready Implementation Guide 117Number of Views
Trending Articles
RSA Authentication Manager 8.9 Release Notes (January 2026) Artifacts to gather in RSA Identity Governance & Lifecycle RSA MFA Agent 2.4.3 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.8 Setup and Configuration Guide RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide