Qualys Enterprise TruRisk - SAML My Page SSO Configuration - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.Procedure
- Sign in to the RSA Cloud Administration Console with administrator credentials.
- Enable SSO on the My Page portal by accessing the RSA Cloud Administration Console > Access > My Page > Single Sign-On (SSO). Ensure it is enabled and protected by two-factor authentication using a Password and Access Policy.
- On the Applications > Application Catalog page, click on Create From Template.
- On the Choose Connector Template page, click Select for SAML Direct.
- On the Basic Information page, enter a name for the configuration in the Name field and click Next Step.
- In the Connection Profile section, select IdP-initiated option.
- Provide the Service Provider details in the following format:
- Assertion Consumer Service (ACS) URL: <Qualys ACS URL>
- Service Provider Entity ID: <Qualys Entity ID>
Refer to the Qualys Enterprise TruRisk platform configuration section to obtain ACS URL and Service Provider Entity ID.
- In the SAML Response Protection section, select IdP signs assertion within response, and download the certificate by clicking Download Certificate.
- Under the User Identity section, select Show Advanced Configuration, then configure Identifier Type and Property as follows:
- Identifier Type: Auto Detect
- Property: Auto Detect
- Under the Statement Attributes section, add the following attributes:
- Attribute Name: qualysguard_external_id
- Attribute Source: Identity Source
- Property: ALTERNATE_USERNAME. This user attribute contains the value of qualysgaurd_external_id. In this case, ALTERNATE_USERNAME holds the qualysgaurd_external_id value.
Refer to the Qualys Enterprise TruRisk platform configuration section to obtain value for qualysgaurd_external_id.
- Enter the relay state value in the Default Relay State section. The relay state value is required for My Page IdP-initiated SAML SSO flow.
Refer Qualys configuration section to obtain the relay state value.
- Click Next Step.
- Choose your desired Access Policy for this application and click Next Step > Save and Finish.
- On the My Applications page, click the Edit dropdown and select Export Metadata to download the metadata.
- Click Publish Changes to save your settings. After publishing, your application will be enabled for SSO.
Configure Qualys Enterprise TruRisk
Perform these steps to configure Qualys Enterprise TruRisk.Procedure
- Contact Qualys support: Visit www.qualys.com/support to request SAML 2.0 SSO activation for your subscription.
- Receive ACS URL and Entity ID: Qualys support will provide the ACS URL and Entity ID needed for RSA platform configuration and request the metadata file downloaded from the RSA platform.
- Configure Trust Relationship: After receiving your metadata file, Qualys support will configure the trust relationship between RSA and the Qualys platform.
- Notification of SSO Activation: Once the trust relationship is configured, Qualys support will notify you that SAML 2.0 SSO has been enabled.
- Obtain Unique URL: Qualys will provide a unique URL specific to your subscription. Users will use this URL to start a session with SAML SSO (e.g., https://qualysguard.qualys.com/fo/login.php?idm_key=XYZ).
- Extract Relay State value: The provided URL will include a key named idm_key. Copy this idm_key value for use as the relay state value in the RSA platform configuration.
- Follow these steps to obtain qualysguard_external_id:
- Log in to the Qualys Enterprise TruRisk platform with admin credentials.
- Navigate to the USERS tab.
- Select the user for whom you need the external_id and click Edit from the Quick Actions dropdown.
- Find the qualysguard_external_id in the General Information section under the External ID attribute. Use this value for the user attribute in the RSA platform, in this case ALTERNATE_USERNAME is used.
- Enable SAML SSO for the user: Click Security tab, check the Enable SAML SSO checkbox to enable SAML for the user and click Save.
Notes:
Follow these steps to add the qualysguard_external_id to RSA users:- Go to Users > Management in the RSA platform, search for the user and select them.
- Enter the qualysguard_external_id value in the appropriate user attribute (e.g., Alternate Username) and click Save.
In this case the value of qualysguard_external_id is added to the attribute ALTERNATE_USERNAME.
The configuration is complete.
Return to Qualys Enterprise TruRisk - RSA Ready Implementation Guide
Related Articles
Qualys Enterprise TruRisk - SAML Relying Party Configuration - RSA Ready Implementation Guide 8Number of Views enVision VACollector collecting report from Qualys fails with HttpsendRequest failed: 12029 8Number of Views Qualys Enterprise TruRisk - RSA Ready Implementation Guide 12Number of Views enVision: Webserver crashes or will not stay started 2Number of Views The Offline Task runtime keeps increasing 27Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?