This section describes how to integrate RSA SecurID Access with PingFederate using SAML Relying Party.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as a Relying Party to PingFederate.
Procedure
- Sign in to RSA Cloud Administration Console.
- Select the Authentication Clients > Relying Parties..
- Click the Add a Relying Party button on the My Relying Parties page.
- From the Relying Party Catalog, click the Service Provider SAML Add button.
- Enter the Name for the Service Provider in the Name field on the Basic Information page.
- Click Next Step.
- On the Authentication page, select SecurID Access manages all authentication.
- From 2.0 Access Policy for Authentication dropdown list, select a policy that was previously configured.
- Click Next Step.
- Select the Enter Manually button on the Connection Profile page.
- Go to the Service Provider section and enter the following details:
- ACS URL: It will be in this format https://<BASE_URL>/sp/ACS.saml2. This represents the base URL of the PingFederate server. Replace <BASE_URL> with the actual domain of your PingFederate setup.
- Audience (Service Provider Entity ID): The format will be <SAML 2.0 ENTITY ID> which can be retrieved from the PingFederate administrative console. Refer to the notes for detailed steps.
Note: If ACS URL and Audience are not known, enter temporary place holder values so that you can continue. After you complete the PingFederate SP configuration and export its metadata, you can import it to fill these values automatically.
- Go to the Message Protection section and select IdP signs entire SAML response.
- Click Save and Finish.
- Locate the application created in Relying Parties page and click the dropdown arrow next to Edit > Metadata > Download Metadata File.
- Click Publish Changes and wait for the operation to be completed.
- After publishing, your application is now enabled for SSO.
Configure PingFederate
Perform these steps to configure PingFederate.
- In the PingFederate administrative console, go to Authentication > Integration > IdP Connections, and then click Create Connection.
- On the Connection Type tab, select Browser SSO Profiles. Then in the Protocol list, select SAML 2.0, and click Next.
- On the Connection Options tab, click Next.
- On the Import Metadata tab, click File, and then click Choose File.
- Locate and select metadata file from the RSA Cloud Authentication Service configuration, click Open. Then, click Next to proceed.
- On the Metadata Summary tab, click Next.
- On the General Info tab, The General Info tab is filled out by the metadata. Review the Partner’s Entity ID and Connection Name. Click Next.
- On the Browser SSO tab, click Configure Browser SSO.
- On the SAML Profiles tab, check the IDP-Initiated SSO and the SP-Initiated SSO checkboxes. Then click Next.
- On the User-Session Creation tab, click Configure User-Session Creation.
- On the Identity Mapping tab, click Account Mapping and then click Next.
- On the Attribute Contract tab, click Next.
Note: From this point onward, the configuration process splits into two distinct paths. Choose one path from each configuration based on your specific needs to proceed.
Configure using an Adapter Instance
Perform these steps to configure PingFederate using Adapter Instance.
- On the Target Session Mapping tab, click Map New Adapter Instance.
- On the Adapter Instance tab, click Manage Adapter Instances.
- On the SP Adapters page, click Create New Instance.
- On the Type tab, enter Instance Name and Instance ID, select OpenToken SP Adapter from the Type dropdown list and click Next.
- On the Instance Configuration tab, enter the Password and Confirm Password field values (This is used to generate the encryption key and is not referenced elsewhere). Then click Next.
- On the Actions tab, click Next.
- On the Extended Contract page, click Next.
- On the Target App Info tab, leave the Application Name and URL fields blank. Then click Next.
- On the Summary tab, click Save.
- On the SP Adapters page, click Done.
- On the Adapter Instance tab, from the Adapter Instance dropdown list, select the adapter name created previously and click Next.
- On the Adapter Data Store tab, keep the default selection of Use only the Attributes Available in the SSO Assertion, and then click Next.
- On the Adapter Contract Fulfillment tab, set the following details:
- Select Assertion from the Source dropdown menu.
- Select SAML_SUBJECT from the Value dropdown menu.
Note: These selections map the attributes from the inbound assertion to the connection attributes.
- Click Next to proceed.
- On the Issuance Criteria tab, click Next.
- To complete the adapter configuration, click Done on the Adapter Mapping Summary tab. Then, on the Target Session Mapping tab.
- Review the User-Session Creation Summary tab, and then click Done.
- On the User Session Creation tab, click Next.
- On the Protocol Settings tab, click Configure Protocol Settings.
Note: The Protocol Settings tab shows the currently configured values from the metadata.
- On the SSO Service URLs tab, review the Endpoint URLs extracted from the metadata. Click Next.
- On the Allowable SAML Bindings tab, ensure only Post and Redirect are selected, and then click Next.
- On the Overrides tab, click Next.
- On the Signature Policy tab, use the default selection of Use SAML-Standard Signature Requirements where the IdP will sign the response. Click Next.
- On the Encryption Policy tab, keep the default selection of None. Click Next.
- On the Protocol Settings Summary tab, review and click Done.
- On the Protocol Settings tab, click Next.
- On the Browser SSO Summary tab, review the settings and click Done.
- On the Browser SSO tab, click Next.
- On the Credentials tab, verify the IdP signing certificate is available, and then click Next.
Note: The signing public key was included because you imported metadata.
- On the Activation and Summary tab, ensure the Connection Status is Active, make note of the SSO Application Endpoint URL and click Save.
- On the IdP Connections page, locate the IdP Connection created, open the Select Action list and click Export Metadata.
Note: If temporary placeholder values were used during the RSA Cloud Authentication Service configuration, return and update them with the values from the PingFederate metadata file
Configuration completed.
Configure using an Authentication Policy Contract
Perform these steps to configure PingFederate using an Authentication Policy Contract.
- On the Target Session Mapping tab, click Map New Authentication Policy.
- On the Authentication Policy Contract tab, click Manage Policy Contracts.
- On the Policy Contracts page, click Create New Contract.
- On the Contract Info tab, enter Contact Name and click Next.
- On the Contract Attributes page, click Next.
- On the Authentication Policy Contract Summary Page, click Save.
- On the Policy Contracts page, click Done.
- On the Authentication Policy Contract tab, select the contract created previously from the Authentication Policy Contract dropdown list. Click Next.
- On the Attribute Retrieval tab, select Use Only the Attributes Available in the SSO Assertion and click Next.
- On the Contract Fulfillment tab, set the following and then click Next:
-
- Select Assertion from the Source dropdown list.
- Select SAML_SUBJECT from the Value dropdown list.
- On the Issuance Criteria tab, click Next.
- To complete the configuration, click Done on the Authentication Policy Mapping Summary tab. Then, on the Target Session Mapping tab, click Next.
- On the User-Session Creation Summary tab, review the information and click Done to return to the User-Session Creation tab.
- On the User Session Creation tab, click Next.
- On the Protocol Settings tab, click Configure Protocol Settings.
Note: The Protocol Settings tab shows the currently configured values from the metadata.
- On the SSO Service URLs tab, review the Endpoint URLs extracted from the metadata. Click Next.
- On the Allowable SAML Bindings tab, ensure only Post and Redirect are selected, and then click Next.
- On the Overrides tab, click Next.
- On the Signature Policy tab, use the default selection of Use SAML-Standard Signature Requirements where the IdP will sign the response. Click Next.
- On the Encryption Policy tab, keep the default selection of None. Click Next.
- On the Protocol Settings Summary tab, review and click Done.
- On the Protocol Settings tab, click Next.
- On the Browser SSO Summary tab, review the settings and click Done.
- On the Browser SSO tab, click Next.
- On the Credentials tab, verify the IdP signing certificate is available, and then click Next.
Note: The signing public key was included because you imported metadata.
- On the Activation and Summary tab, ensure the Connection Status to Active, make note of the SSO Application Endpoint URL and click Save.
- On the IdP Connections page, locate the IdP Connection created, open the Select Action list and click Export Metadata.
Note: If temporary placeholder values were used during the RSA Cloud Authentication Service configuration, return and update them with the values from the PingFederate metadata file
- In the PingFederate administrative console, navigate to Applications > SP Connections and click the 3rd party application SAML SP connection.
- Go to the Assertion Creation section and click Authentication Source Mapping.
- On the Authentication Source Mapping tab, click Map New Authentication Policy.
- On the Authentication Policy Contract tab, choose the contract created previously from the Authentication Policy Contract dropdown list and click Next.
- On the Mapping Method page, click Next.
- On the Attribute Contract Fulfillment tab, choose Authentication Policy Contract from the Source dropdown list and subject from the Value dropdown list. Then click Next.
- On the Issuance Criteria page, click Next.
- On the Summary page, review the information and click Save.
- In the PingFederate administrative web console, navigate to Authentication > Policies and then click Add Policy.
- On the Policy page, enable the policy contract created previously.
- Configure the authentication policy as shown in the following information:
-
- The first Action branch is configured to HTML form authentication method.
- The second Action branch is configured to use RSA ID Plus IdP connection that was previously configured.
- The third Action branch is configured to use an Authentication Policy Contract to take attributes from the IdP connection and send them to the created SAML SP.
- Click Options on the IdP Connection (second Action branch).
- On the Incoming User ID pop-up, choose the Adapter from the Source dropdown menu and username from the Attribute dropdown and click Done.
- Click Contract Mapping on the Policy Contract (third Action branch).
- On the Attribute Sources & User Lookup page, click Next.
- On the Contract Fulfillment tab, choose the IdP Connection from the Source dropdown list and choose SAML_SUBJECT from the Value dropdown list and click Next.
- On the Issuance Criteria tab, click Next.
- On the Summary tab, review the information and click Done.
- On the Policy page, click Done.
- On the Policies page, click Save to complete the configuration process.
Configuration completed.
Notes
- To access and verify the required settings, go to System > Server > Protocol Settings, then under the Federation Info tab, note the Base URL used in the RSA Cloud Authentication Service configuration. Additionally, verify that the SAML 2.0 Entity ID field contains a valid and unique value, as it will also be used in the RSA Cloud Authentication Service configuration.
Related Articles
Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 499Number of Views Microsoft Entra ID - SCIM Client for Cloud Authentication Service - RSA Ready Implementation Guide 521Number of Views Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 233Number of Views Symantec Privileged Access Manager - SAML My Page SSO Configuration - RSA Ready Implementation Guide 4Number of Views
Trending Articles
An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process