PingOne - SAML IDR SSO Configuration - RSA Ready Implementation Guide
This article describes how to integrate RSA Cloud Authentication Service with PingOne using SAML IDR SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as IDR SSO to PingOne.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog. Search for Ping Identity PingOne and select Add to add the connector.
- On the Basic Information page, select Identity Router.
- Enter the name for the application in the Name field and click Next Step.
- Navigate to Initiate SAML Workflow section. In the Connection URL field, enter the value of the Identity Provider URL found on the same page.
- Select SP-initiated and for the Binding Method for SAML Request, choose POST.
- Scroll down to the SAML Identity Provider (Issuer) section.
- The Identity Provider URL is automatically generated.
- The Identity Provider Entity ID is automatically generated.
- Select Generate Cert Bundle, set a common name for your company certificate, and then select Generate and Download.
- Select Choose File and upload the private key from the generated certificate bundle.
- Select Choose File and upload the certificate from the generated certificate bundle.
- In the Service Provider section, enter the following details:
- Assertion Consumer Service (ACS) URL: https://auth.pingone.eu/<Environment ID>/saml20/sp/acs
- Service Provider Entity ID: This can be obtained from the PingOne environment.
- In the User Identity section, configure Identifier Type, Identity Source, and Property as follows:
- Identifier Type: Email Address
- Identity Source: Select your user identity source.
- Property: mail
- In the Statement Attributes, remove all the default attributes.
- Click Next Step.
- On the User Access page, select the access policy that the identity router will use to determine which users can access the application.
- Click Next Step.
- On the Portal Display page, configure the portal display and other settings. Then click Save and Finish.
- On the My Applications page, click the Edit dropdown and select Export Metadata to download the metadata.
- Click Publish Changes to save your settings. After publishing, your application will be enabled for SSO.
Configure PingOne
Perform these steps to configure PingOne.Procedure
- Sign in to the Ping Identity admin console for the environment that uses PingOne.
- In the left pane, select External IDPs from the Integrations dropdown menu.
- Select +Add Provider.
- Under CUSTOM, select SAML.
- Enter a custom name for the external identity provider in the Name field, which will be RSA Cloud Authentication Service and optionally add a description. Then, select Continue.
- Copy PINGONE (SP) ENTITY ID value which will be used in the RSA configuration as the Service Provider Entity ID. Select Continue.
- Select Import Metadata and then choose the metadata file you downloaded from the RSA platform. Copy the ACS Endpoint value, which will be used in the RSA configuration as the Assertion Consumer Service (ACS) URL. Then, select Continue.
- After importing the RSA Metadata file. the SSO Endpoint, IDP Entity ID and the certificate fields will be auto-populated. Ensure that the SSO Binding type is set to HTTP POST.
- Optionally, map any additional attributes needed between RSA as an Identity Provider and PingOne. Select Save and Continue, and you should see RSA listed under External IDPs.
- In the left pane, go to the Authentication tab.
- Select +Add Policy. Enter a name for the new policy, and from the Step Type dropdown, select External Identity Provider. Then, choose the configured RSA IDP from the External Identity Provider dropdown, and select Save.
- In the left pane, go to Applications. Choose the applications that will use RSA as the External Identity Provider for authenticating users.
- Select an application, and its settings will appear on the right. Ensure that the policy you created earlier assigned in the Policies section for the protected application.
User Experience
- Log in directly to the application protected by Ping One. After the user enters their organization’s email address, they will be redirected to PingOne, which will then automatically redirect them to RSA Cloud Authentication Service for Authentication.
- The user will authenticate through the RSA Cloud Authentication Service. If successful, they will be logged in and redirected back to the protected application.
The configuration is complete.
Return to PingOne - RSA Ready Implementation Guide
Related Articles
Microsoft Office 365 - SAML IDR SSO Configuration - RSA Ready Implementation Guide 59Number of Views Microsoft Entra ID - SAML My Page SSO Configuration - RSA Ready Implementation Guide 206Number of Views Microsoft Office 365 - SAML My Page SSO Configuration - RSA Ready Implementation Guide 118Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views Salesforce - SAML My Page SSO Configuration - RSA Ready Implementation Guide 66Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) How to factory reset an RSA Authentication Manager 8.x hardware appliance without a factory reset button from the Operatio… Deploying RSA Authenticator 6.2.2 for Windows Using DISM Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?