Intercom - SAML SSO Agent Configuration - SecurID Access Implementation Guide
This section describes how to integrate SecurID Access with Intercom using a SAML SSO Agent.
Architecture Diagram
Configure SecurID Access Cloud Authentication Service
Perform these steps to configure SecurID Access Cloud Authentication Service(CAS) as an SSO Agent SAML IdP to Intercom.
Procedure
-
Sign into the SecurID Access Cloud Administration Console and browse to Applications > Application Catalog.
-
Click on Create From Template then click Select for SAML Direct.
-
On Basic Information page enter a Name for the application, ie. Intercom Then click on Next Step.
-
On Connection Profile page.
-
Choose IDP-Initiated or SP-Initiated. Note: The following IDP-initiated configuration works for SP-initiated as well.
- In Connection URL field leave the defaults.
-
Note the Identity Provider URL and Issuer Entity ID. These values are automatically generated. They may be needed later for the configuration of Intercom.
-
Click on Generate Cert Bundle, set a a common name for your company certificate. Then click Generate and Download .
-
Select Choose File and upload the private key from the generated certificate bundle.
-
Select Choose File and upload the public cert from the generated certificate bundle. This is the cert.perm file.
-
Unselect Include Certificate on Outgoing Assertion.
-
Scroll down to Service Provider section.
-
For the Assertion Consumer Service (ACS) enter the documented value for SAML name for this workspace from Intercom. This URL is based on the SAML name, https://app.intercom.com/saml/<SAML_NAME>/consume. For example, https://app.intercom.com/saml/z6d2test/consume.
-
For the Audience (Service Provider Issuer ID) enter the documented value for SAML name for this workspace from Intercom. This URL is based on the SAML name, https://app.intercom.com/saml/<SAML_NAME>. For example, https://app.intercom.com/saml/z6d2test.
-
Scroll down to User Identity section.
-
Ensure Identifier Type = Email Address, set your Identity Source and Property = mail.
-
Expand Advanced Configuration
-
For Attribute Extension click +Add.
-
For Attribute Name enter lastName and select corresponding Property , i.e. sn.
-
Click +Add.
-
For Attribute Name enter firsttName and select corresponding Property , i.e. givenName.
-
For Sign Outgoing Assertion select Assertion within response.
-
For Relay State URL Encoding uncheck Send encoded URL in outgoing assertion.
-
Click Next Step.
-
-
On User Access page select the Access Policy you require. Allow All Authenticated Users is the least restrictive. Click Next Step.
-
On Portal Display Page.
-
Select Display in Portal.
-
Upload an Application Icon if you wish.
-
Set an Application Tooltip if you wish.
-
Click on Save and Finish.
-
-
For this new Connector, click on the down arrow next to the Edit button and Export Metadata to save off the IDP metadata information for configuration of .
-
Click on Publish Changes. Your application is now enabled for SSO. If you make any additional changes to the application configuration you will need to republish.
Configure Intercom
Perform these steps to integrate Intercom as an SSO Agent SAML SP to SecurID Access Cloud Authentication Service.
Procedure
-
Login into Intercom as an administrator with email in the same domain that SSO is being configured with.
-
Click on User account icon and choose Settings.
-
From Security choose Security Settings.
-
Scroll down to the Authentication methods section and select Require SAML SSO.
-
First configure allowed domains if not done so.
-
Type in your domain and click on Add domain.
-
If first time, verify the domain, a pop up will give the required information to validate the domain. It may take some time for the domain to be validated.
-
Once a domain has been invalided it will appear in the list off allowed domains above the text field.
-
Note the SAML name for this workspace. This string represents the instance name needed to configure the Service Provider information in the SecurID CAS configuration.
-
For Identity provider Single Sign-On URL provide the Identity Provider Entity ID from the above in the SecurID CAS configuration. For example, https://testportal.pe.rsatest.net/IdPServlet?idp_id=1v9d1q5testme. Note the https:// part of the string is not needed
-
For Single Sign On x509 Certificate copy and paste the certificate downloaded above in the SecurID CAS configuration.
-
Click on Save .
-
A pop up will appear test the configuration. Click on the Authenticate with identity Provider and authenticate the user same logged into Intercom via SecurID Cloud Authentication service.
Configuration is complete.
Next Step: Head back to the main page.
Related Articles
ProxyClick-integration-configuration-sso-agent-saml 19Number of Views Aha-integration-configuration-sso-agent-saml 9Number of Views TextMagic-integration-configuration-sso-agent-saml 6Number of Views Bonusly-integration-configuration-sso-agent-saml 2Number of Views Terminus-integration-configuration-sso-agent-saml 4Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x