Rapid7 - SAML My Page SSO Configuration - RSA Ready Implementation Guide
This article describes how to integrate Rapid7 with RSA Cloud Access Service (CAS) using My Page SSO.
Configure CAS
Perform these steps to configure CAS using My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog.
- Click Create from Template and click Select for SAML Direct.
- On the Basic Information page, choose Cloud.
- Enter a name for the application and click Next Step.
- On the Connection Profile page, navigate to the Initiate SAML Workflow section and choose IdP-initiated.
- Under Data Import method, import the metadata file from Rapid7 to populate the Assertion Consumer Service (ACS) URL value and Service Provider Entity ID.
- Scroll down to the Identity Provider section and make a note of the Identity Provider URL that is required for the Rapid7 configuration.
- Under the Message Protection section, for SAML Response Protection, choose IdP signs assertion within response.
- Scroll down to the User Identity section and select the following values:
- Identifier Type: emailAddress
- Property: mail
- Click Next Step.
- In the Access Policy section, choose the policy for the application in the drop-down list.
- On the Portal Display page, select Display in Portal.
- Click Next step.
- Configure the Fulfilment details as per your organization policy.
- Locate the application that you created on the My Applications page and click the drop-down arrow next to Edit > Export Metadata.
- Click Publish Changes.
Your application is now enabled for SSO.
Configure Rapid7
Perform these steps to configure Rapid7.
Procedure
- Log on to Rapid7 with the administrator account and browse to the Administration > Authentication: 2FA and SSO.
- Under AUTHENTICATION, navigate to SAML AUTHENTICATION SOURCE and click CONFIGURE SAML SOURCE.
- Under SAML Configuration, click Upload IDP Metadata File to upload the metadata file that was downloaded from RSA.
- Click Save to complete the SAML configuration.
- To create users on the InsightVM console, navigate to Administration > Users > User Management and click Add user.
- Fill in the details on the Add User form.
Note that the e-mail address is case sensitive and must match the existing user in RSA. - In the Authorization Method drop-down list, select SAML.
- Select the role as Global Admin and save to create the user.
The configuration is complete.
Related Articles
Palo Alto NGFW Global Protect - SAML My Page SSO Configuration - RSA Ready Implementation Guide 43Number of Views Delinea - SAML My Page SSO Configuration - RSA Ready Implementation Guide 14Number of Views Microsoft Entra ID - SAML My Page SSO Configuration - RSA Ready Implementation Guide 206Number of Views Salesforce - SAML My Page SSO Configuration - RSA Ready Implementation Guide 66Number of Views Microsoft Office 365 - SAML My Page SSO Configuration - RSA Ready Implementation Guide 119Number of Views
Trending Articles
How to manipulate imported RSA SecurID Software Token(s) on an iPhone or iPad device Connection fails to Cloud Authentication Service when connecting through a proxy server from RSA Authentication Manager to… Downloading RSA Authentication Manager license files or RSA Software token seed records Unable to login to RSA Authentication Manager Security Console as super admin RSA Authentication Manager 8.9 Release Notes (January 2026)
Don't see what you're looking for?