This article describes how to integrate RSA Cloud Access Service (CAS) with RSA Mobile Lock Console Security using SAML Relying Party.
Configure CAS
Perform these steps to configure CAS.
Procedure
- Sign in to RSA Cloud Administration Console.
- Navigate to Authentication Clients menu and select Relying Parties.
- Click Add a Relying Party.
- In the Relying party catalog section, click Add for Service Provider SAML.
- On the Basic Information page, enter the name for the application in the Name field and click Next Step.
- In the Authentication tab, select SecurID manages all authentication.
- Select a Primary Authentication Method and an Access Policy as required and click Next Step.
- Under Data Import method, enter the following values:
- ACS URL: https://SAP Netweaver domainname/sap/bc/gui/sap/its/webgui
- Service Provider Entity ID: The name must match the Issuer Entity ID as configured in the SAP Netweaver.
- In the Message Protection section for SAML Response Protection:
-
- Select IdP signs assertion with response.
- Scroll down to the User Identity section and select the following information:
- Identifier Type > emailAddress
- Property > mail
- In the Identity Provider section, enter Entity ID.
- Click Save and Finish.
- Click Publish Changes. After publishing, your application is now enabled for SSO.
The Configuration is complete.
SAP NetWeaver Configuration
Perform these steps to configure SAP NetWeaver.
Procedure
- Start the SAML 2.0 configuration application (transaction SAML2).
- Click Enable SAML 2.0 Support.
- Enter the Provider Name and click Next.
Note: The Provider Name must match the Audience (Service Provider Entity ID) as configured in the RSA ID Plus console.
- Set the Clock Skew Tolerance and click Next.
- Set the Identity Provider Discovery Selection Mode to Automatic, mark the checkbox for Assertion Consumer Service HTTP POST binding and click Finish.
Note: None of the other Assertion Consumer Service or Single Logout Service bindings are currently supported in RSA ID Plus.
- Open the Trusted Providers tab, and click Add > Manually.
- Enter a Name for the new trusted identity provider and click Next.
Note: The Name must match the Issuer Entity ID as configured in the RSA ID Plus Console.
- In the Primary Signing Certificate section, click Browse and upload the Primary Signing Certificate.
- Click Next.
Note: The primary signing certificate must match the certificate uploaded to the RSA ID Plus console.
- Click Add to add a single sign-on endpoint.
- Select HTTP POST from the Binding dropdown menu, enter the Location URL and click OK.
Note: The Location URL must match the Identity Provider URL as configured in the RSA ID Plus Console.
- Click Next.
- Click Next.
- Click Next.
- Click Finish.
- Click Edit, then Add to add a NameID format.
- Choose a NameID format and click OK.
Note: The NameID format must match the Identifier Type as configured in User Identity section of the RSA ID Plus console.
- Click Save and then Enable > OK.
The configuration is complete.
Related Articles
Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 252Number of Views CyberArk Password Vault Web Access - SAML Relying Party Configuration - RSA Ready Implementation Guide 45Number of Views Okta - SAML Relying Party Configuration - RSA Ready Implementation Guide 45Number of Views Workday - SAML Relying Party Configuration - RSA Ready Implementation Guide 4Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Governance & Lifecycle 8.0.0 Administrators Guide RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA MFA Agent 2.5 for Microsoft Windows Installation and Administration Guide