SUSE Rancher v2.6.1 - Relying Party Configuration - SecurID Access Implementation Guide
This section describes how to integrate SecurID Access with SUSE Rancher using relying party. Relying party uses SAML 2.0 to integrate SecurID Access as a SAML Identity Provider (IdP) to SUSE Rancher SAML Service Provider (SP).
Architecture Diagram
Configure SecurID Access Cloud Authentication Service
Perform these steps to configure SecurID Access Cloud Authentication Service(CAS) as a relying party SAML IdP to SUSE Rancher .
Procedure
-
Sign into the SecurID Access Cloud Administration Console and browse to Authentication Clients > Relying Parties and click Add a Relying Party. Then select Add for a SAML service provider.
-
On Basic Information page enter a Name for the application, ie. Rancher Then click on Next Step.
-
On Authentication page.
-
Select the RSA SecurID Access manages all authentication OR Service provider manages primary authentication, and RSA SecurID Access manages additional authentication.
-
Select the desired Primary Authentication Method from the dropdown list.
-
Select the desired policy from the Access Policy for Additional Authentication.
-
Click Next Step.
-
-
On Connection Profile page.
-
Under the Service Provider Metadata section.
-
Enter the Assertion Consumer Service (ACS) . Enter the value for the Assertion Consumer Service (ACS) URL . This is a well defined Rancher URL, https://<Rancher API Host >/v1-saml/adfs/saml/acs where host is the location of your Rancher instance. For example, https://<rancher-IP>/v1-saml/adfs/saml/acs. The Rancher API Host can be found in the Rancher SAML configuration page. The ACS will be dependent on the type of SAML Auth provider you choose.
-
Enter the Service Provider Entity ID. Enter the value for the Service Provider(SP) Entity ID. This is a well defined Rancher URLhttps://<Rancher API Host >/v1-saml/adfs/saml/metadata where host is the location of your Rancher instance. The Rancher API Host can be found in the Rancher SAML configuration page. Some Rancher SAML types will let you define this in an Entity ID Field. The Entity ID will be dependent on the type of SAML Auth provider you choose.
-
Uncheck SP signs SAML Requests.
-
Click on Download Certificate. This is the IdP public certificate that will be used below in the Rancher configuration.
-
Open Advanced Configuration section
-
For Identifier TypeEmail Address choose mail for the Property.
-
Create attributes that can be map to the required Rancher SAML configurations (Display Name, User Name, UID, Groups). The UID returned must map to the User ID in Rancher. To add these expand Advanced Configuration to add those attributes.
-
Click Add for each giving an attribute name and the property that matches in the SecurID configuration.
For example:
Attribute Name Property displayName givenName userName email UID email groupName user Note: SecurID does not current support the return of groups, Set this to a constant that maps to a group or role. It will be ignored on the side.
-
Note/Copy the Identity Provider Entity ID field . For Example, https://rsa-securidtest-pe.securid.com/saml-fe/sso.
-
-
Click on Save and Finish.
-
Browse to Authentication Clients > Relying Parties
-
Scroll down to the your newly created Relying party and click down arrow to Edit and choose View or Download IdP MetatData and save off the metadata to be used in the Rancher configuration below.
-
Click on Publish Changes. Your application is now enabled for SSO. If you make any additional changes to the application configuration you will need to republish.
Configure SUSE Rancher
Perform these steps to configure SUSE Rancher as a Relying Party SAML SP to SecurID Access Cloud Authentication Service.
Procedure
-
Login to Rancher as a user that can be authenticated against SecurID. The user is validated as part of the SAML enablement process.
-
Under Configuration select Users and Authentication.
-
Click on Auth Provider and then select a SAML provider. For example, select ADFS. Rancher does not currently have a generic or SecurID specific SAML provider. We will use the ADFS configuration to enable SecurID access via SAML.
-
Fill in the required attribute fields with the corresponding attribute names configured in SecurID Access above.
For example:
Field Value Display Name displayName User Name userName UID UID Groups groupName -
For Private Key, upload your given private key.
-
For Certificate, upload the IdP public certificate file downloaded above.
-
For Metadata XML, upload the saved IdP Metadata XML file.
-
Click Enable.
-
You will be directed to a pop up to validate the SecurID Access configuration with a valid user. Once the login process is completed successfully you will be directed back to the Rancher Authentication Provider configuration page.
-
Select the desired setting for who should be able to login and use Rancher.
-
Click on Save.
-
You are able to log into Rancher using the configured Authentication Provider.
Next Step: Proceed to the Use Case Configuration Summary section for information on how to apply the Relying Party configuration to your chosen use case.
Return to the main page for more certification related information.
Related Articles
RSA Governance & Lifecycle Integration: SUSE Linux Enterprise Server SLES Summary 12Number of Views RSA Authentication Manager 8.7 SP1 Patch 1 Hotfix 1 153Number of Views How to modify the low disk space critical event email warning threshold from 5 GB to 10 GB free in RSA Authentication Mana… 251Number of Views Determine SUSE Linux version from the command line in RSA Authentication Manager 8.x 381Number of Views How to upload files to RSA Customer Support for analysis 218Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) Artifacts to gather in RSA Identity Governance & Lifecycle RSA Governance & Lifecycle 8.0.0 Administrators Guide RSA Governance & Lifecycle 8.0.0 Installation Guide