Team Password Manager - SAML My Page SSO Configuration - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.Procedure
- Sign in to the RSA Cloud Administration Console with administrator credentials.
- Enable SSO on the My Page portal by accessing the RSA Cloud Administration Console > Access > My Page > Single Sign-On (SSO). Ensure it is enabled and protected by two-factor authentication using a Password and Access Policy.
- On the Applications > Application Catalog page, click on Create From Template.
- On the Choose Connector Template page, click Select for SAML Direct.
- On the Basic Information page, enter a name for the configuration in the Name field and click Next Step.
- In the Connection Profile section, select IdP-initiated option.
- Provide the Service Provider details in the following format:
- Assertion Consumer Service (ACS) URL: https://<IPAddress or FQDN>/teampasswordmanager/index.php/login/samlacs
- Service Provider Entity ID: https://<IP address>/teampasswordmanager/index.php/login/samleid
Refer to the Team Password Manager configuration to obtain ACS URL and Service Provider Entity ID.
- In the SAML Response Protection section, select IdP signs assertion within response, and download the certificate by clicking Download Certificate.
- Under the User Identity section, select Show Advanced Configuration, then configure Identifier Type and Property as follows:
- Identifier Type: Auto Detect
- Property: Auto Detect
- Click Next Step.
- Choose your desired Access Policy for this application and click Next Step > Save and Finish.
- On the My Applications page, click the Edit dropdown and select Export Metadata to download the metadata.
- Click Publish Changes to save your settings. After publishing, your application will be enabled for SSO.
Configure Team Password Manager
Perform these steps to configure Team Password Manager.Procedure
- Log in to Team Password Manager as an administrator.
- Go to Settings and select SAML Authentication, then click the Enable SAML Authentication button to enable SAML authentication.
- Click Yes to enable SAML authentication.
- Copy the Entity Id and Assertion Consumer Service URL for RSA configuration.
- Click Edit Identity Provider SAML Settings button under the Identity Provider (IdP) Settings section to configure identity provider details.
- Provide the following details and click Save.
- Entity Id: Enter the value of entityID, obtainable from the metadata file downloaded from the RSA platform.
- Single Sign-on URL: Enter the value of SingleSignOnService, obtainable from the metadata file downloaded from the RSA platform.
- Certificate: Copy and paste the certificate downloaded from the RSA platform.
- To convert a user to a SAML user, go to Users/Groups and then click on the user under Users section.
- Click Convert to SAML User.
- Click Yes to confirm the conversion.
- After converting the user to a SAML user, the SAML icon will appear.
The configuration is complete.
Return to Team Password Manager - RSA Ready Implementation Guide
Related Articles
Team Password Manager - SAML Relying Party Configuration - RSA Ready Implementation Guide 2Number of Views How to contact the RSA Ready team with questions 50Number of Views Idera ER/Studio Team Server - RSA Ready Implementation Guide 12Number of Views Team Password Manager - RSA Ready Implementation Guide 3Number of Views Idera ER/Studio Team Server - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 10Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) Artifacts to gather in RSA Identity Governance & Lifecycle RSA Governance & Lifecycle 8.0.0 Administrators Guide RSA Governance & Lifecycle 8.0.0 Installation Guide
Don't see what you're looking for?