WordPress - SAML Relying Party Configuration - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as Relying Party to WordPress.Procedure
- Sign in to RSA Cloud Administration Console.
- Navigate to the Authentication Clients menu and click Relying Parties.
- On the Relying Party Catalog page, click Add a Relying Party and click Add for Service Provider SAML.
- On the Basic Information page, enter the name for the application in the Name field and click Next Step.
- On the Authentication page, choose SecurID manages all authentication.
- Select a Primary Authentication Method and Access Policy as required and click Next Step.
- For providing Service Provider details:
- Click Import Metadata and click Choose File.
- Select the file that is downloaded from the Service Provider.
See the Configure WordPress section to download the metadata.
- Review the ACS URL and Service Provider Entity ID values that are auto-filled.
- In the SAML Response Protection section, choose IdP signs assertion within response.
- Download the certificate by clicking Download Certificate.
- Click Show Advanced Configuration.
- Under the User Identity section, configure Identifier Type and Property. For example, Identifier Type: AutoDetect and Property: Auto Detect.
- Click Save and Finish.
- On the My Relying Parties page, click the Edit drop-down icon and select the Metadata option to download the metadata.
- Click Publish Changes. Your application is now enabled for SSO.
Configure WordPress
Perform these steps to configure WordPress.As a prerequisite, obtain paid access to use miniOrange SAML 2.0 SSO plugin.
Procedure
- Log on to WordPress with admin credentials.
- Click miniOrange SAML 2.0 SSO plugin and select Service Provider Setup section.
- Click Add New IDP.
- Click RSA SecureID.
- Click Select this IDP as the Default Identity Provider toggle and click Upload IDP Metadata.
- Provide the following details:
- Identity Provider Name – Name of the Identity Provider Configured.
- Upload Metadata – Click Choose File and upload the metadata file downloaded from RSA.
- Click Upload.
- Click Redirection & SSO Links section.
- Under Auto-Redirection from site, choose Redirect to default IDP if user not logged in.
- Click Enable Backdoor Login toggle and click Update.
- Under the Login section, select your configured Identity Provider and click Select, click Add a Single Sign on the WordPress login page (Skip the last two steps if only IdP initiated flow configured).
- Scroll down and click Update.
- Under Service Provider Metadata section click Download XML Metadata (this file will be used to configure the RSA platform).
Return to WordPress - RSA Ready Implementation Guide
Related Articles
Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 252Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 519Number of Views Microsoft Entra ID Custom Controls - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 193Number of Views Microsoft Entra ID - SAML Relying Party Configuration - RSA Ready Implementation Guide 86Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) Artifacts to gather in RSA Identity Governance & Lifecycle RSA Governance & Lifecycle 8.0.0 Administrators Guide RSA Governance & Lifecycle 8.0.0 Installation Guide
Don't see what you're looking for?