ScreenSteps - SAML SSO Agent Configuration - SecurID Access Implementation Guide
This section describes how to integrate SecurID Access with ScreenSteps using a SAML SSO Agent.
Architecture Diagram
Configure SecurID Access Cloud Authentication Service
Perform these steps to configure SecurID Access Cloud Authentication Service (CAS) as an SSO Agent SAML IdP to ScreenSteps.
Procedure
-
Sign into the Cloud Administration Console and browse to Applications > Application Catalog
-
Click on Create From Template found in he upper right of the page then select SAML Direct
-
On Basic Information page enter a Name for the application, ie. ScreenSteps Then click on Next Step.
-
On Connection Profile page
-
In Connection URL field, verify the default setting
-
Choose IDP-Initiated or SP-Initiated
-
Scroll down to SAML Identity Provider (Issuer) section.
-
Note the Identity Provider URL and Issuer Entity ID. These values are automatically generated. They may be needed later for the configuration of ScreenSteps
-
Click on Generate Cert Bundle, set a a common name for your company certificate. Then click Generate and Download
-
Select Choose File and upload the private key from the generated certificate bundle
-
Select Choose File and upload the cert.pem from the generated certificate bundle.
-
Select Include Certificate on Outgoing Assertion
-
Scroll down to Service Provider section
-
Enter the Assertion Consumer Service (ACS) update the URL using the DOMAIN and UNIQUE_ACCOUNT_ID for your instance of ScreenSteps https://<DOMAIN>.screenstepslive.com/saml/consume/<UNIQUE_ACCOUNT_ID>. This can also be obtained from the SAML Consumer URL in the ScreenSteps configuration below. For example, https://rsa-ready.screenstepslive.com/saml/consume/782.
-
Enter the Audience (Service Provider Issuer ID) as ScreenSteps-Live
-
Scroll down to User Identity section
-
Ensure Identifier Type = Email Address, set your Identity Source and Property = mail
-
Click Next Step
-
-
On User Access page select the Access Policy you require. Allow All Authenticated Users is the least restrictive. Click Next Step
-
On Portal Display Page
-
Select Display in Portal
-
Upload an Application Icon if you wish
-
Set an Application Tooltip if you wish.
-
Click on Save and Finish
-
-
Click on Publish Changes. Your application is now enabled for SSO. If you make any additional changes to the application configuration you will need to republish.
Configure ScreenSteps
Perform these steps to integrate ScreenSteps with SecurID Access as a SAML SSO Agent.
Procedure
-
Sign into ScreenSteps as Admin and browse to Account .
-
Select Single Sign-On .
-
Click on Create Single Sign-on Endpoint.
-
Enter value for Title.
-
Select SAML as the Mode.
-
Enter for Remote Login URL the Identity Provider Entity ID value obtained above. For example, https://rsa-blr-pe.auth-demo.securid.com/saml-fe/sso.
-
Click on Create.
-
Note the SAML Consumer URL provided, this will be used above for Cloud Authentication Service configuration above.
-
Under SAML Certificate click on Upload new SAML Certificate file with the SecurID Access IdP public certificate generated in the certificate bundle above.
-
Click on Update.
Configuration is complete.
Next Step: See main page for more certification information.
Related Articles
Help Scout - RSA Ready Implementation Guide 2Number of Views RSA Authentication Manager 8.2 Help Desk Administrator's Guide 46Number of Views RSA Authentication Manager Help - Table of Contents 136Number of Views Cloud Access Service Help - Table of Contents 40Number of Views Integrate AM with CAS Help - Table of Contents 49Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle