PingOne - SAML My Page SSO Configuration - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.Procedure
- Sign in to the RSA Cloud Administration Console with administrator credentials.
- Enable SSO on the My Page portal by accessing the RSA Cloud Administration Console > Access > My Page > Single Sign-On (SSO). Ensure it is enabled and protected by two-factor authentication using a Password and Access Policy.
- On the Applications > Application Catalog page, search for Ping Identity PingOne and click Add to add connection.
- On the Basic Information page, enter a name for the configuration in the Name field.
- In the Choose where to enable you application section, select Cloud and then click Next Step.
- In the Connection Profile section, select IdP-initiated option.
- Provide the Service Provider details in the following format:
- Assertion Consumer Service (ACS) URL: https://auth.pingone.eu/<Environment ID>/saml20/sp/acs
- Service Provider Entity ID: This can be obtained from the PingOne environment.
- In the SAML Response Protection section, select IdP signs assertion within response, and download the certificate by clicking Download Certificate.
- Under the User Identity section, select Show Advanced Configuration, then configure Identifier Type and Property as follows:
- Identifier Type: email Address
- Property: mail
- In the Statement Attributes section, remove all the default attributes.
- Click Next Step.
- Choose your desired Access Policy for this application and click Next Step > Save and Finish.
- On the My Applications page, click the Edit dropdown and select Export Metadata to download the metadata.
- Click Publish Changes to save your settings. After publishing, your application will be enabled for SSO.
Configure PingOne
Perform these steps to configure PingOne.Procedure
- Sign in to the Ping Identity admin console for the environment that uses PingOne.
- In the left pane, select External IDPs from the Integrations dropdown menu.
- Select +Add Provider.
- Under CUSTOM, select SAML.
- Enter a custom name for the external identity provider in the Name field, which will be RSA Cloud Authentication Service and optionally add a description. Then, select Continue.
- Copy PINGONE (SP) ENTITY ID value which will be used in the RSA configuration as the Service Provider Entity ID. Select Continue.
- Select Import Metadata and then choose the metadata file you downloaded from the RSA platform. Copy the ACS Endpoint value, which will be used in the RSA configuration as the Assertion Consumer Service (ACS) URL. Then, select Continue.
- After importing the RSA Metadata file. the SSO Endpoint, IDP Entity ID and the certificate fields will be auto-populated. Ensure that the SSO Binding type is set to HTTP POST.
- Optionally, map any additional attributes needed between RSA as an Identity Provider and PingOne. Select Save and Continue, and you should see RSA listed under External IDPs.
- In the left pane, go to the Authentication tab.
- Select +Add Policy. Enter a name for the new policy, and from the Step Type dropdown, select External Identity Provider. Then, choose the configured RSA IDP from the External Identity Provider dropdown, and select Save.
- In the left pane, go to Applications. Choose the applications that will use RSA as the External Identity Provider for authenticating users.
- Select an application, and its settings will appear on the right. Ensure that the policy you created earlier assigned in the Policies section for the protected application.

User Experience
- Log in directly to the application protected by Ping One. After the user enters their organization’s email address, they will be redirected to PingOne, which will then automatically redirect them to RSA Cloud Authentication Service for Authentication.
- The user will authenticate through the RSA Cloud Authentication Service. If successful, they will be logged in and redirected back to the protected application.
The configuration is complete.
Return to PingOne - RSA Ready Implementation Guide
Related Articles
Microsoft Entra ID - SAML My Page SSO Configuration - RSA Ready Implementation Guide 206Number of Views Microsoft Office 365 - SAML My Page SSO Configuration - RSA Ready Implementation Guide 118Number of Views Palo Alto NGFW Global Protect - SAML My Page SSO Configuration - RSA Ready Implementation Guide 43Number of Views AWS IAM - SAML My Page SSO Configuration - RSA Ready Implementation Guide 34Number of Views Salesforce - SAML My Page SSO Configuration - RSA Ready Implementation Guide 66Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process How to factory reset an RSA Authentication Manager 8.x hardware appliance without a factory reset button from the Operatio… Deploying RSA Authenticator 6.2.2 for Windows Using DISM
Don't see what you're looking for?