This section describes how to integrate RSA SecurID Access with Firehydrant using relying party. Relying party uses SAML 2.0 to integrate RSA SecurID Access as a SAML Identity Provider (IdP) to Firehydrant SAML Service Provider (SP).
Architecture Diagram
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as a relying party SAML IdP to Firehydrant .
Procedure
-
Sign into the RSA Cloud Administration Console and browse to Authentication Clients > Relying Parties and click Add a Relying Party.
-
Click the Add a Relying Party button on the My Relying Parties page.
-
From the Relying Party Catalog select the +Add button for Service Provider SAML.
-
Enter a Name for the Service Provider in the Name field on the Basic Information page.
-
Click the Next Step button.
-
On the Authentication page, select RSA SecurID Access manages all authentication.
-
Select your access policy from the Access Policy for Additional Authentication drop-down menu.
-
Select Next Step.
-
For Connection Profile page's Service Provider Metadata section, enter the following information:
-
Assertion Consumer Service (ACS) URL Enter the url: https://app.firehydrant.io/sso/saml/consume.
-
Service Provider Entity ID - Enter the url: https://app.firehydrant.io/sso/saml/consume.
-
Select Default Service Provider Entity ID in Audience for SAML Response section.
-
Download Certificate and click Choose File and attach the .PEM file in the configuration. This certificate will be required in Step 5 of the Configure SAML in Firehydrant section.
-
Click Show Advanced Configuration and configure User Identity with the following values:
-
Identifier Type : Auto Detect
-
Property : Auto Detect
-
In the Attribute Extension section, click on +Add button and add the following two attributes:
a. Attribute Name : lastName, Identity Source : your identity source, Property : sn.
b. Attribute Name : firstName, Identity Source : your identity source, Property : givenName.
-
Click Save and Finish.
-
Click Publish Changes
- Navigate to Authentication Clients > Relying Parties and locate Firehydrant in the list and from the Edit option, select View or Download IdP Metadata and note the entityID. This will be required in Step 4 of the Configure SAML in Firehydrant section.
Configure SAML in Firehydrant
Perform these steps to configure Firehydrant as a Relying Party SAML SP to RSA Cloud Authentication Service.
Procedure
-
Log onto your Firehydrant account using administrative credentials.
-
Navigate to Organization > Single sign on.
-
On the Single Sign On page, click the checkbox Enable SSO. Additional fields will appear.
-
Enter the following URL values:
-
In the IdP X509 Certificate text area, enter the certificate text of the RSA certificate downloaded in Step 11 of Configure RSA Cloud Authentication Service section.
-
In the Domains section, click Add domain and enter your email domain. This is the email domain with which the user will login to Firehydrant via SAML.
-
Click Save.
Configuration is complete.
Return to the main page for more certification related information.
Related Articles
Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 519Number of Views PingFederate - Relying Party Configuration Using SAML - RSA Ready Implementation Guide 202Number of Views Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 252Number of Views Microsoft Entra ID Custom Controls - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 193Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) Artifacts to gather in RSA Identity Governance & Lifecycle RSA Governance & Lifecycle 8.0.0 Administrators Guide RSA Governance & Lifecycle 8.0.0 Installation Guide