Salesforce - SAML Relying Party Configuration - RSA Ready Implementation Guide
This article describes how to integrate Salesforce with RSA Cloud Access Service (CAS) using Relying Party.
Configure CAS
Perform these steps to configure CAS using Relying Party.
Procedure
- Sign in to the RSA Cloud Administration Console.
- Click Authentication Clients > Relying Parties.
- On the My Relying Parties page, click Add a Relying Party.
- On the Relying Party Catalog page, click Add for Service Provider SAML.
- On the Basic Information page, enter the name for the application in the Name field and click Next Step.
- On the Authentication page, choose RSA manages all authentication.
- In the 2.0 Access Policy for Authentication drop-down list, select a policy that was previously configured, and then click Next Step.
- Under Data Input Method, choose Import Metadata.
- Click Choose File and import the metadata downloaded from Salesforce to populate the ACS URL and Service Provider Entity ID.
- Under the Message Protection section, choose IdP signs entire SAML response.
- Scroll down to the User Identity section and select the following values:
- Identifier Type: unspecified
- Property: mail
- Click Save and Finish.
- Click Publish Changes and wait for the operation to be completed.
After publishing, your application is enabled for SSO. - Under My Relying Parties, navigate to the newly created relying party.
- In the Edit drop-down list, choose Metadata.
Configure Salesforce
Perform these steps to configure Salesforce.
Procedure
- Log in to the Salesforce tenant with an administrator account.
- Click the gear icon and click Open Advanced Setup.
- In the left pane, search for Single Sign-On Settings under the Identity section and click it.
- Click Edit and select the SAML Enabled checkbox, if not selected already, and then click Save.
- Choose the metadata file downloaded from RSA and click Create.
- Add the downloaded IdP certificate and click Save.
- Click Download Metadata.
- Navigate to My Domain under Company Settings.
- Click Edit under Authentication Configuration, select the checkbox with your configuration name, and then click Save.
The configuration is complete.
Related Articles
Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 567Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 117Number of Views Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 252Number of Views Workday - SAML Relying Party Configuration - RSA Ready Implementation Guide 4Number of Views Microsoft Entra ID - SAML Relying Party Configuration - RSA Ready Implementation Guide 87Number of Views
Trending Articles
RSA Authentication Manager 8.9 Release Notes (January 2026) RSA announces the availability of the RSA SecurID Hardware Appliance 230 based on the Dell PowerEdge R240 Server How to troubleshoot Oracle database ORA-04030 errors in RSA Identity Governance & Lifecycle RSA Authentication Manager Upgrade Process Microsoft SQL Server Collectors can no longer connect to the SQL Server database after upgrade to Microsoft SQL Server 201…
Don't see what you're looking for?