Symantec Privileged Access Manager - SAML My Page SSO Configuration - RSA Ready Implementation Guide
This article describes how to configure Symantec Privileged Access Manager with Cloud Access Service (CAS) using My Page SSO.
Configure CAS
Perform these steps to configure CAS using My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog.
- Click Create from Template and click Select for SAML Direct.
- On the Basic Information page, choose Cloud.
- Enter the name for the application and click Next Step.
- On the Connection Profile page, navigate to the Initiate SAML Workflow section and choose IdP-initiated.
- Specify the following details from Symantec Privileged Access Manager.
- Assertion Consumer Service (ACS) URL: https://hostname.SymantecPAM/idp/profile/SAML2/POST/SSO
- Service Provider Entity ID: Unique in both CAS and Symantec Privileged Access Manager.
- Scroll down to the Identity Provider section.
- Make a note of the Identity Provider URL, as it is needed for the Symantec Privileged Access Manager configuration.
- Under the Message Protection section, for SAML Response Protection:
- Select the certificate downloaded from Symantec Privileged Access Manager.
- Choose IdP signs assertion within response.
- Scroll down to the User Identity section and select the following:
- Identifier Type: emailAddress
- Property: mail
- Click Next Step and select the configured policy.
- On the Portal Display page, select Display in Portal and click Next Step.
- Configure the Fulfillment details as per your organization's policy.
- Locate the application you created on the My Applications page and click the drop-down arrow next to Edit, and click Edit > Export Metadata.
- Click Publish Changes. After publishing, your application is now enabled for SSO.
Configure Symantec Privileged Access Manager
Perform these steps to configure Symantec Privileged Access Manager.
Procedure
- Log in to Symantec Privileged Access Manager with the admin account.
- Browse to Configuration > Security > SAML and provide the following details under SP Configuration.
- Entity ID: It should be unique in both CAS and the Symantec portal.
- Fully Qualified HostName: Specify the CAS hostname here.
- Certificate Key Pair: gkcert.crt. This can be uploaded in the CAS SAML request.
- Navigate to Configured Remote SAML IDP to upload IDP Metadata File, which was downloaded from RSA.
- Click Save to complete the SAML configuration.
- Navigate to Configuration > Security > Certificates > Download from Filename and select the certificate to download it. This needs to be used in CAS configuration.
The configuration is complete.
Related Articles
Keeper Security - SAML My Page SSO Configuration - RSA Ready Implementation Guide 11Number of Views Keeper Security - SAML Relying Party Configuration - RSA Ready Implementation Guide 6Number of Views Oracle Cloud Infrastructure - SAML My Page SSO Configuration - RSA Ready Implementation Guide 20Number of Views Keeper Security - RSA Ready Implementation Guide 25Number of Views F5 BIG-IP APM - SAML Relying Party Configuration - RSA Ready Implementation Guide 30Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?