SUSE Rancher v2.6.1 - SAML SSO Agent Configuration - SecurID Access Implementation Guide
This section describes how to integrate SecurID Access with SUSE Rancher using a SAML SSO Agent.
Architecture Diagram
Configure SecurID Access Cloud Authentication Service
Perform these steps to configure SecurID Access Cloud Authentication Service(CAS) as an SSO Agent SAML IdP to SUSE Rancher.
Procedure
-
Sign into the SecurID Access Cloud Administration Console and browse to Applications > Application Catalog.
-
Click on Create From Template then click Select for SAML Direct.
-
On Basic Information page enter a Name for the application, ie. Rancher Then click on Next Step.
-
On Connection Profile page.
-
Choose SP-Initiated.
- In Connection URL enter the Rancher Service Provider(SP) Entity ID from step k below. For example, https://<Rancher API Host >/v1-saml/adfs/saml/metadata.
- For Binding Method for SAML Request select Redirect.
-
Note the Identity Provider URL and Issuer Entity ID. These values are automatically generated. They may be needed later for the configuration of Rancher.
-
Click on Generate Cert Bundle, set a a common name for your company certificate. Then click Generate and Download .
-
Select Choose File and upload the private key from the generated certificate bundle.
-
Select Choose File and upload the cert.pem from the generated certificate bundle. This is the IdP public certificate.
-
Select Include Certificate on Outgoing Assertion.
-
Scroll down to Service Provider section.
-
For the Assertion Consumer Service (ACS) enter the value for the Assertion Consumer Service (ACS) URL . This is a well defined Rancher URL, https://<Rancher API Host >/v1-saml/adfs/saml/acs where host is the location of your Rancher instance. For example, https://<rancher-IP>/v1-saml/adfs/saml/acs. The Rancher API Host can be found in the Rancher SAML configuration page. The ACS will be dependent on the type of SAML Auth provider you choose.
-
For the Audience (Service Provider Issuer ID) enter the value for the Service Provider(SP) Entity ID. This is a well defined Rancher URLhttps://<Rancher API Host >/v1-saml/adfs/saml/metadata where host is the location of your Rancher instance. The Rancher API Host can be found in the Rancher SAML configuration page. Some Rancher SAML types will let you define this in an Entity ID Field. The Entity ID will be dependent on the type of SAML Auth provider you choose. .
-
Scroll down to User Identity section.
-
Ensure Identifier Type = Email Address, set your Identity Source and Property = mail.
-
Create attributes that can be map to the required Rancher SAML configurations (Display Name, User Name, UID, Groups). The UID returned must map to the User ID in Rancher. To add these expand Advanced Configuration to add those attributes.
-
Click Add for each giving an attribute name and the property that matches in the SecurID configuration.
For example:
Attribute Name Property displayName givenName userName email UID email groupName user Note: SecurID does not current support the return of groups, Set this to a constant that maps to a group or role. It will be ignored on the side.
-
Click Next Step.
-
-
On User Access page select the Access Policy you require. Allow All Authenticated Users is the least restrictive. Click Next Step.
-
On Portal Display Page.
-
Select Display in Portal.
-
Upload an Application Icon if you wish.
-
Set an Application Tooltip if you wish.
-
Click on Save and Finish.
-
-
For this new Connector, click on the down arrow next to the Edit button and Export Metadata to save off the IDP metadata information for configuration of SUSE.
-
Click on Publish Changes. Your application is now enabled for SSO. If you make any additional changes to the application configuration you will need to republish.
Configure SUSERancher
Perform these steps to configure SUSERancher as an SSO Agent SAML SP to SecurID Access Cloud Authentication Service.
Procedure
-
Login to Rancher as a user that can be authenticated against SecurID. The user is validated as part of the SAML enablement process.
-
Under Configuration select Users and Authentication.
-
Click on Auth Provider and then select a SAML provider. For example, select ADFS. Rancher does not currently have a generic or SecurID specific SAML provider. We will use the ADFS configuration to enable SecurID access via SAML.
-
Fill in the required attribute fields with the corresponding attribute names configured in SecurID Access above.
For example:
Field Value Display Name displayName User Name userName UID UID Groups groupName -
For Private Key, upload your given private key.
-
For Certificate, upload the IdP public certificate file downloaded above.
-
For Metadata XML, upload the saved IdP Metadata XML file.
-
Click Enable.
-
You will be directed to a pop up to validate the SecurID Access configuration with a valid user. Once the login process is completed successfully you will be directed back to the Rancher Authentication Provider configuration page.
-
Select the desired setting for who should be able to login and use Rancher.
-
Click on Save.
-
You are able to log into Rancher using the configured Authentication Provider. For example, Log in with ADFS.
Next Step: Proceed to the Use Case Configuration Summary section for information on how to apply the SAML SSO Agent configuration to your use case.
Return to the main page for more certification related information.
Related Articles
Quick Setup Guide - Configure IdP-Initiated SAML for Third-Party Application 90Number of Views Checking Replication in RSA Authentication Manager 8.1 with OpenSSL 1.75KNumber of Views RSA SecurID Software Token Administrator's Guide 532Number of Views How to check local file system disk space usage for RSA Identity Governance & Lifecycle 1.31KNumber of Views When running the RSA SecurID Authentication Agent for PAM's acetest utility, getting error: Cannot Do AceInitialize for c… 250Number of Views
Trending Articles
Downloading RSA Authentication Manager license files or RSA Software token seed records Unable to login to RSA Authentication Manager Security Console as super admin RSA Authentication Manager 8.9 Release Notes (January 2026) How to manipulate imported RSA SecurID Software Token(s) on an iPhone or iPad device Connection fails to Cloud Authentication Service when connecting through a proxy server from RSA Authentication Manager to…