Salesforce - SAML Relying Party Configuration - RSA Ready Implementation Guide
This article describes how to integrate Salesforce with RSA Cloud Access Service (CAS) using Relying Party.
Configure CAS
Perform these steps to configure CAS using Relying Party.
Procedure
- Sign in to the RSA Cloud Administration Console.
- Click Authentication Clients > Relying Parties.
- On the My Relying Parties page, click Add a Relying Party.
- On the Relying Party Catalog page, click Add for Service Provider SAML.
- On the Basic Information page, enter the name for the application in the Name field and click Next Step.
- On the Authentication page, choose RSA manages all authentication.
- In the 2.0 Access Policy for Authentication drop-down list, select a policy that was previously configured, and then click Next Step.
- Under Data Input Method, choose Import Metadata.
- Click Choose File and import the metadata downloaded from Salesforce to populate the ACS URL and Service Provider Entity ID.
- Under the Message Protection section, choose IdP signs entire SAML response.
- Scroll down to the User Identity section and select the following values:
- Identifier Type: unspecified
- Property: mail
- Click Save and Finish.
- Click Publish Changes and wait for the operation to be completed.
After publishing, your application is enabled for SSO. - Under My Relying Parties, navigate to the newly created relying party.
- In the Edit drop-down list, choose Metadata.
Configure Salesforce
Perform these steps to configure Salesforce.
Procedure
- Log in to the Salesforce tenant with an administrator account.
- Click the gear icon and click Open Advanced Setup.
- In the left pane, search for Single Sign-On Settings under the Identity section and click it.
- Click Edit and select the SAML Enabled checkbox, if not selected already, and then click Save.
- Choose the metadata file downloaded from RSA and click Create.
- Add the downloaded IdP certificate and click Save.
- Click Download Metadata.
- Navigate to My Domain under Company Settings.
- Click Edit under Authentication Configuration, select the checkbox with your configuration name, and then click Save.
The configuration is complete.
Related Articles
Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 250Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 509Number of Views Workday - SAML Relying Party Configuration - RSA Ready Implementation Guide 4Number of Views PingFederate - Relying Party Configuration Using SAML - RSA Ready Implementation Guide 201Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?