Qualys Enterprise TruRisk - SAML Relying Party Configuration - RSA Ready Implementation Guide
2 years ago

This article describes how to integrate RSA with Qualys Enterprise TruRisk using SAML Relying Party.
 

Configure RSA Cloud Authentication Service

Perform these steps to configure RSA Cloud Authentication Service as Relying Party to Qualys Enterprise TruRisk.
Procedure
  1. Sign in to the RSA Cloud Administration Console.
  2. Navigate to the Authentication Clients menu, and from the dropdown, select Relying Parties.image.png
  3. In the Relying Party Catalog, select Add a Relying Party and click Add for Service Provider SAML.image.png
  4. On the Basic Information page, enter a name for the application in the Name field and click Next Step.image.png
  5. In the Authentication tab, select SecurID manages all authentication.
  6. Select Access Policy as required and click Next Step.image.png
  7. Provide the Service Provider details in the following format:
    1. Assertion Consumer Service (ACS) URL: <Qualys ACS URL>
    2. Service Provider Entity ID: <Qualys Entity ID>
image.png
Refer to the Qualys Enterprise TruRisk platform configuration section to obtain ACS URL and Service Provider Entity ID.
  1. In the SAML Response Protection section, select IdP signs assertion within response, and download the certificate by clicking Download Certificate.image.png
  2. Under the User Identity section, select Show Advanced Configuration, then configure Identifier Type and Property as follows: 
    1. Identifier Type: Auto Detect 
    2. Property: Auto Detect
image.png
  1. Click Save and Finish.
  2. On the My Relying Parties page, click Edit dropdown and select Metadata option to download the metadata.image.png
  3. Click Publish Changes to save your settings. After publishing, your application will be enabled for SSO.image.pngimage.png
 

Configure Qualys Enterprise TruRisk

Perform these steps to configure Qualys Enterprise TruRisk.

Procedure
  1. Contact Qualys support: Visit www.qualys.com/support to request SAML 2.0 SSO activation for your subscription.
  2. Receive ACS URL and Entity ID: Qualys support will provide the ACS URL and Entity ID needed for RSA platform configuration and request the metadata file downloaded from the RSA platform.
  3. Configure Trust Relationship: After receiving your metadata file, Qualys support will configure the trust relationship between RSA and the Qualys platform.
  4. Notification of SSO Activation: Once the trust relationship is configured, Qualys support will notify you that SAML 2.0 SSO has been enabled. 
  5. Obtain Unique URL: Qualys will provide a unique URL specific to your subscription. Users will use this URL to start a session with SAML SSO (e.g., https://qualysguard.qualys.com/fo/login.php?idm_key=XYZ).
  6. Extract Relay State value: The provided URL will include a key named idm_key. Copy this idm_key value for use as the relay state value in the RSA platform configuration.
  7. Follow these steps to obtain qualysguard_external_id:
    1. Log in to the Qualys Enterprise TruRisk platform with admin credentials.
    2. Navigate to the USERS tab.
image.png
  1. Select the user for whom you need the external_id and click Edit from the Quick Actions dropdown.image.png
  2. Find the qualysguard_external_id in the General Information section under the External ID attribute. Use this value for the user attribute in the RSA platform, in this case ALTERNATE_USERNAME is used.
image.png
  1. Enable SAML SSO for the user: Click Security tab, check the Enable SAML SSO checkbox to enable SAML for the user and click Save.image.png

Notes:

Follow these steps to add the qualysguard_external_id to RSA users:
  1. Go to Users > Management in the RSA platform, search for the user and select them.
  2. Enter the qualysguard_external_id value in the appropriate user attribute (e.g., Alternate Username) and click Save.
In this case the value of qualysguard_external_id is added to the attribute ALTERNATE_USERNAME.image.png

The configuration is complete.
Return to Qualys Enterprise TruRisk - RSA Ready Implementation Guide