Salesforce Experience Cloud - SAML My Page SSO Configuration - RSA Ready Implementation Guide
This article describes how to integrate Salesforce Experience Cloud with RSA Cloud Authentication Service using My Page SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.
Procedure
- Sign in to the RSA Cloud Administration Console with administrator credentials.
- Enable SSO on the My Page portal by accessing the RSA Cloud Administration Console > Access > My Page > Single Sign-On (SSO). Ensure it is enabled and protected by two-factor authentication using a Password and Access Policy.
- On the Applications > Application Catalog page, search for Salesforce and click Add to add a connection for Salesforce Communities (Salesforce Experience cloud).
- On the Basic Information page, enter a name for the configuration in the Name field and click Next Step. Ensure the Cloud option is selected under Choose where to enable your application.
- In the Connection Profile section, select the SP-initiated option and provide the Connection URL in the following format: https://<Current My Domain URL >/home/home.jsp.
The Current My Domain URL can be found under Company Settings > My Domain in the left pane on Salesforce.
The preceding URL is the landing page of the users. - To provide Service Provider details, select Enter Manually, and provide the following details:
- Assertion Consumer Service (ACS) URL: https://<Current My Domain URL>
- Service Provider Entity ID: Enter any value and use the same value in the Entity ID field when configuring Salesforce.
- In the SAML Response Protection section, select IdP signs assertion within response if not already selected, and download the certificate by clicking Download Certificate.
- Under the User Identity section, click Connection Profile Show Advanced Configuration, and then configure Identifier Type and Property, if not already configured, as follows:
- Identifier Type: Auto Detect
- Property: Auto Detect
- Click Next Step.
- Choose your desired Access Policy for this application and click Next Step > Save and Finish.
- On the My Applications page, click the Edit drop-down icon and select Export Metadata to download the metadata.
- Use this metadata file to configure Salesforce and then update the configuration on RSA by downloading the latest metadata from Salesforce. (Edit the connector created on RSA and import the latest metadata from Salesforce in the Connection Profile tab.
- Click Publish Changes to save your settings. After publishing, your application will be enabled for SSO.
Configure Salesforce Experience Cloud
Perform these steps to configure Salesforce Experience Cloud.
Procedure
- Log in to Salesforce Experience Cloud admin console: https://login.Salesforce Experience Cloud.com
- In the Salesforce Experience Cloud console, click the gear icon and select Setup.
- In the left pane, under the Identity section, search for and select Single Sign-On Settings.
- Click Edit and select the SAML Enabled checkbox under Federated Single Sign-On Using SAML if it is not already selected, then click Save.
- Select New from Metadata File.
- Choose the metadata file downloaded from RSA Platform and click Create.
- Upload the downloaded IdP certificate in the Identity Provider Certificate section by clicking Choose File, then click Save. Ensure the Entity ID is the same as what is configured as the Service Provider Entity ID on RSA.
- Click Download Metadata if you want to import the Salesforce metadata to RSA.
- Navigate to My Domain under Company Settings. Click Edit under Authentication Configuration, check the checkbox next to your configuration name, and click Save.
The configuration is complete.
Return to Salesforce Experience Cloud - RSA Ready Implementation Guide
Related Articles
Salesforce - SCIM Configuration - RSA Ready Implementation Guide 51Number of Views UPDATE: RSA Via LG Integrations with Salesforce Using TLS 1.0 Encryption Protocol 38Number of Views Salesforce SSO Device Activation Changes – Impact on RSA Integrations 28Number of Views User changes his mobile device in RSA Cloud Authentication Service 126Number of Views Root CA certificate is required for activation error when importing a custom certificate signed by a known CA into Operati… 507Number of Views
Trending Articles
An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process
Don't see what you're looking for?