CloudAMQP - SAML SSO Agent Configuration - RSA Ready SecurID Access Implementation Guide
This section describes how to integrate SecurID Access with CloudAMQP using a SAML SSO Agent.
Architecture Diagram
Configure SecurID Cloud Authentication Service
Perform these steps to configure SecurID Cloud Authentication Service(CAS) as an SSO Agent SAML IdP to CloudAMQP.
Procedure
-
Sign into the Cloud Administration Console and browse to Applications > Application Catalog.
-
Click on Create From Template found in he upper right of the page then select SAML Direct.
-
On Basic Information page enter a Name for the application, ie. CloudAMQP Then click on Next Step.
-
On Connection Profile page.
-
In Connection URL field, verify the default setting.
-
Choose IDP-Initiated or SP-Initiated.
-
Scroll down to SAML Identity Provider (Issuer) section.
-
Note the Identity Provider URL and Issuer Entity ID. These values are automatically generated. They may be needed later for the configuration of CloudAMQP.
-
Click on Generate Cert Bundle, set a a common name for your company certificate. Then click Generate and Download .
-
Select Choose File and upload the private key from the generated certificate bundle.
-
Select Choose File and upload the cert from the generated certificate bundle.
-
Select Include Certificate on Outgoing Assertion .
-
Scroll down to Service Provider section.
-
Enter the Assertion Consumer Service (ACS) From the ACS URL CloudAMQP configuration below. For example: https://customer.cloudamqp.com/login/saml.
-
Enter the Audience (Service Provider Issuer ID) From the SAML Audience URL in theCloudAMQP configuration below. For example: https://customer.cloudamqp.com/saml/metadata/ee8269ae-d46a-473e-ba33-d5f7ed15afe2.
-
Scroll down to User Identity section .
-
Ensure Identifier Type = Email Address, set your Identity Source and Property = mail.
-
Click Next Step.
-
-
On User Access page select the Access Policy you require. Allow All Authenticated Users is the least restrictive. Click Next Step.
-
On Portal Display Page
-
Select Display in Portal.
-
Upload an Application Icon if you wish.
-
Set an Application Tooltip if you wish.
-
Click on Save and Finish.
-
-
Browse to Application > My Applications .
-
Locate newly create application for CloudAMQP
-
Click on Down Arrow next to Edit button
-
Select Export Metadata data. This will be used below for CloudAMQP configuration. Cryptlex requires the url of the metadata file, so host the downloaded metadata file or mail the Idp metadata to support, they’ll host the file and send the URL.
-
Click on Publish Changes. Your application is now enabled for SSO. If you make any additional changes to the application configuration you will need to republish.
Configure CloudAMQP
Perform these steps to integrate CloudAMQP with SecurID Access as a SAML SSO Agent.
Procedure
-
Sign into CloudAMQP and browse to Team Settings > SAML.
-
Note the ACS URL and SAML Audience URL these are used above in the SecurID Cloud Authenitcation Service (CAS) configuration above.
-
For the Issuer/Entity ID enter the Issuer Entity ID from the SecurID Cloud Authenitcation Service (CAS) configuration above. For example, 2kshvydovyh.
-
Save changes.
Configuration is complete.
See main page for more certification information.
Related Articles
Okta - SAML Relying Party Configuration - RSA Ready Implementation Guide 45Number of Views Microsoft Entra ID - SAML My Page SSO Configuration - RSA Ready Implementation Guide 206Number of Views Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 242Number of Views Sumologic - SAML SSO Agent Configuration - RSA Ready SecurID Access Implementation Guide 23Number of Views RSA Governance and Lifecycle - SAML SSO Agent Configuration - RSA Ready SecurID Access Implementation Guide 36Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) How to factory reset an RSA Authentication Manager 8.x hardware appliance without a factory reset button from the Operatio… Deploying RSA Authenticator 6.2.2 for Windows Using DISM Artifacts to gather in RSA Identity Governance & Lifecycle