This section describes how to integrate RSA SecurID Access with Firehydrant using a SAML SSO Agent.
Architecture Diagram
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as an SSO Agent SAML IdP to Firehydrant . During configuration of the IdP you will need some information from the SP. This information includes (but is not limited to) Assertion Consumer Service URL and Service Provider Entity ID.
Procedure
-
Sign into RSA Cloud Administration Console and browse to Applications > Application Catalog, click Create From Template and select SAML Direct.
-
Enter a name for the application in the Name field on the Basic Information page and click the Next Step button.
-
Navigate to Initiate SAML Workflow section.
-
In the Connection URL field, enter the url: https://app.firehydrant.io/sso/saml/consume.
-
Choose SP-Initiated.
-
-
Scroll down to SAML Identity Provider (Issuer) section. Click Generate Cert Bundle, enter the Common Name and Generate and Download the certificate. This certificate will be required in Step 5 of Configure SAML in Firehydrant.
-
Identity Provider URL - <Automatically generated>
-
Issuer Entity ID - <Automatically generated>
-
Select Choose File and upload the private key.
-
Select Choose File to import the public signing certificate.
-
-
Scroll down to the Service Provider section.
-
Assertion Consumer Service (ACS) - Enter the url: https://app.firehydrant.io/sso/saml/consume.
-
Audience (Service Provider Entity ID) - firehydrant.
-
-
Scroll to the User Identity section, select the following values.
- Identifier Type – Email Address
-
Identity Source – name of your user identity source
-
Property – mail
-
Click Show Advanced Configuration. In the Attribute Extension section, click on +Add button and add the following two attributes:
a. Attribute Source : Identity Source, Attribute Name : firstName, Identity Source : your identity source, Property : givenName.
b. Attribute Source : Identity Source, Attribute Name : lastName, Identity Source : your identity source, Property : sn.
-
Click Next Step.
-
On the User Access page, select Allow All Authenticated Users radio button.
-
Click Next Step.
-
On the Portal Display page, select Display in Portal.
-
Click Save and Finish.
-
Click Publish Changes.
Configure SAML in Firehydrant
Perform these steps to configure Firehydrant as an SSO Agent SAML SP to RSA Cloud Authentication Service.
Procedure
-
Log onto your Firehydrant account using administrative credentials.
-
Navigate to Organization > Single sign on.
-
On the Single Sign On page, click the checkbox Enable SSO. Additional fields will appear.
-
Enter the following URL values:
-
In the IdP X509 Certificate text area, enter the certificate text of the RSA certificate downloaded in Step 4 of Configure RSA Cloud Authentication Service section.
-
In the Domains section, click Add domain and enter your email domain. This is the email domain with which the user will login to Firehydrant via SAML.
-
Click Save.
Configuration is complete.
Return to the main page for more certification related information.
Related Articles
Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 252Number of Views Microsoft Office 365 - SAML My Page SSO Configuration - RSA Ready Implementation Guide 121Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views Sumologic - SAML SSO Agent Configuration - RSA Ready SecurID Access Implementation Guide 23Number of Views Microsoft Entra ID - SAML My Page SSO Configuration - RSA Ready Implementation Guide 206Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) Artifacts to gather in RSA Identity Governance & Lifecycle RSA Governance & Lifecycle 8.0.0 Administrators Guide RSA Governance & Lifecycle 8.0.0 Installation Guide