Symantec Privileged Access Manager - SAML Relying Party Configuration - RSA Ready Implementation Guide
This article describes how to integrate Cloud Access Service (CAS) with Symantec Privileged Access Manager using SAML Relying Party.
Configure CAS
Perform these steps to configure CAS
Procedure
- Sign in to RSA Cloud Administration Console.
- Navigate to Authentication Clients > Relying Parties.
- On the Relying Party Catalog page, click Add a Relying Party and click Add for Service Provider SAML.
- On the Basic Information page, enter the name for the application in the Name field and click Next Step.
- On the Authentication tab, choose RSA manages all authentication, and select a Primary Authentication Method and Access Policy as required.
- Click Next Step.
- Specify the following details from Symantec Privileged Access Manager.
- Assertion Consumer Service (ACS URL): https://hostname.SymantecPAM/idp/profile/SAML2/POST/SSO
- Service Provider Entity ID: Unique in both CAS and Symantec Privileged Access Manager.
- Under the Message Protection section, for SAML Response Protection:
- Select the certificate downloaded from Symantec Privileged Access Manager.
- Choose IdP signs the assertion with response.
- Scroll down to the User Identity section and select the following:
- Identifier Type: emailAddress
- Property: mail
- Make a note of the Identity Provider Entity ID, as it is needed for the Symantec Privileged Access Manager configuration.
- Click Save and Finish.
- On the My Relying Parties page, for the created Relying Party, click the Edit drop-down icon and select the Metadata option to download the metadata.
- Click Publish Changes.
Your application is now enabled for SSO.
Configure Symantec Privileged Access Manager
Perform these steps to configure Symantec Privileged Access Manager.
Procedure
- Log in to Symantec Privileged Access Manager with the admin account.
- Browse to Configuration > Security > SAML and provide the following details under SP Configuration.
- Entity ID: It should be unique in both CAS and the Symantec portal.
- Fully Qualified HostName: Specify the CAS hostname here.
- Certificate Key Pair: gkcert.crt. This can be uploaded in the CAS SAML request.
- Navigate to Configured Remote SAML IDP to upload IDP Metadata File, which was downloaded from RSA.
- Click Save to complete the SAML configuration.
- Navigate to Configuration > Security > Certificates > Download from Filename and select the certificate to download it. This needs to be used in CAS configuration.
The configuration is complete.
Related Articles
How to replace the RSA Authentication Manager self signed console certificate with a signed certificate from Microsoft Act… 1.59KNumber of Views AFX Server and Remote Collection Agents fail to start after updating Java to version 1.8u241 (1.8.0_241) / 1.7u251 (1.7.0_… 807Number of Views Disable multi-factor authentication (MFA) prompt for "Run as" on machine on which the RSA MFA Agent for Microsoft Windows … 1.2KNumber of Views Upgrading RSA Authentication Manager 276Number of Views Download RSA SecurID Access Cloud User Event audit logs using Cloud Administration REST API CLU 1.83KNumber of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?