SilverFort - SAML My Page SSO Configuration - RSA Ready Implementation Guide
This article describes how to integrate SilverFort with RSA Cloud Access Service (CAS) using My Page SSO.
Configure CAS
Perform these steps to configure CAS using My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog.
- Click Create from Template and then click Select next to SAML Direct.
- On the Basic Information page, choose Cloud.
- Enter a name for the SilverFort application and click Next Step.
- On the Connection Profile page, navigate to the Initiate SAML Workflow section and choose SP-initiated.
- Connection URL: It is not required for SilverFort and can be set to any valid URL. For example, you can use the ACS URL as the Connection URL.
- Under Data Input Method, choose Enter Manually.
- Scroll down to the Service Provider section and provide the details in the following formats:
- Assertion Consumer Service (ACS) URL: Enter your Mobile Messaging Service URL with the addition of the following prefix: /apps/api/sso/response. For example:
- Global - https://raven.silverfort.io/apps/api/sso/response
- Singapore - https://sg.raven.silverfort.io/apps/api/sso/response
- Europe - https://eu.raven.silverfort.io/apps/api/sso/response
- Australia - https://au.raven.silverfort.io/apps/api/sso/response
- India - https://in.raven.silverfort.io/apps/api/sso/response
- Service Provider Entity ID: Enter the SAML Entity ID for your application. To ensure successful authentication, this must match the Audience value set in SilverFort.
- Assertion Consumer Service (ACS) URL: Enter your Mobile Messaging Service URL with the addition of the following prefix: /apps/api/sso/response. For example:
- Under the Message Protection section, choose IdP signs entire SAML response.
- Under the User Identity section, select emailAddress as Identifier Type and mail as Property.
- Under the Statement Attributes section, enter the following attributes:
Attribute Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Property: userName
Attribute Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Property: mail - Click Next Step.
- On the User Access page, select the access policy to determine which users can access the application, and then click Next Step.
- On the Portal Display page, configure the portal display and other settings.
- Click Next Step.
- On the Fulfillment page, configure your preferred settings, or leave the Fulfillment toggle disabled as is, and then click Save and Finish.
- Click Publish Changes and wait for the operation to be completed.
After publishing, your application is enabled for SSO. - Navigate to the newly created application from Application, and in the drop-down list, choose Export Metadata. This metadata will be used later in the SilverFort configuration.
Configure SilverFort
Perform these steps to configure SilverFort.
Procedure
- In the SilverFort Admin Console, navigate to the Settings page and select Integrations.
- Click the Identity Bridge tab.
- Click Add IdP and provide the following details.
- IdP Name: RSA ID Plus
- Application Name: Anything of your choice; for example, RSA_Silverfort_App
- Login URL: The Identity Provider URL copied from RSA (to find this, select Edit on your SAML application in RSA, and copy the Identity Provider URL).
- Issuer: The value of entityID copied from the metadata.
- Audience: The same value set for Service Provider Entity ID in RSA (for example, Silverfort_SP).
- Upload certificate: The certificate that was previously downloaded from RSA.
- Click Save.
Create Bridge Policy
Perform the following steps to create a SilverFort Bridge policy.
- On the Admin Console, navigate to the Policies page.
- Select Create policy and fill all required fields.
- Policy name: Create a name for the policy
- Action: Select Identity Bridge.
- IdP: Select RSA ID Plus.
- Enterprise app: Select the application name you entered in the Bridge Config.
- Click Save.
The configuration is complete.
Related Articles
Downloading the RSA SecurID Access Embedded Identity Router fails on Authentication Manager 8.5 353Number of Views Delinea - SAML My Page SSO Configuration - RSA Ready Implementation Guide 13Number of Views MessageMedia SMS Gateway - On Demand Token Code Delivery Configuration - RSA Ready SecurID Access Implementation Guide 24Number of Views Manage Passwords Automatically 18Number of Views Palo Alto NGFW Global Protect - SAML My Page SSO Configuration - RSA Ready Implementation Guide 43Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?