Firehydrant - SAML SSO Agent Configuration - RSA Ready SecurID Access Implementation Guide
2 years ago
Originally Published: 2021-12-14

This section describes how to integrate RSA SecurID Access with Firehydrant using a SAML SSO Agent.

Architecture Diagram

jaink9_0-1639522086125.png

Configure RSA Cloud Authentication Service

Perform these steps to configure RSA Cloud Authentication Service as an SSO Agent SAML IdP to Firehydrant . During configuration of the IdP you will need some information from the SP. This information includes (but is not limited to) Assertion Consumer Service URL and Service Provider Entity ID.

Procedure

    1. Sign into RSA Cloud Administration Console and browse to Applications > Application Catalog, click Create From Template and select SAML Direct.

      jaink9_1-1639522153300.png
    2. Enter a name for the application in the Name field on the Basic Information page and click the Next Step button.

      jaink9_0-1639523111621.png
    3. Navigate to Initiate SAML Workflow section.

        1. In the Connection URL field, enter the url: https://app.firehydrant.io/sso/saml/consume.

        2. Choose SP-Initiated.

      jaink9_1-1639523140075.png
    4. Scroll down to SAML Identity Provider (Issuer) section. Click Generate Cert Bundle, enter the Common Name and Generate and Download the certificate. This certificate will be required in Step 5 of Configure SAML in Firehydrant.

      jaink9_2-1639523166612.png
      1. Identity Provider URL - <Automatically generated>

      2. Issuer Entity ID - <Automatically generated>

      3. Select Choose File and upload the private key.

      4. Select Choose File to import the public signing certificate.

    1. Scroll down to the Service Provider section.

      jaink9_3-1639523187272.png
      1. Assertion Consumer Service (ACS) - Enter the url: https://app.firehydrant.io/sso/saml/consume.

      2. Audience (Service Provider Entity ID) - firehydrant.

    2. Scroll to the User Identity section, select the following values.

      jaink9_4-1639523217659.png
      • Identifier Type – Email Address
      • Identity Source – name of your user identity source

      • Property – mail

    3. Click Show Advanced Configuration. In the Attribute Extension section, click on +Add button and add the following two attributes:

      a. Attribute Source : Identity Source, Attribute Name : firstName, Identity Source : your identity source, Property : givenName.

      b. Attribute Source : Identity Source, Attribute Name : lastName, Identity Source : your identity source, Property : sn.

    1. Click Next Step.

    2. On the User Access page, select Allow All Authenticated Users radio button.

      jaink9_5-1639523255406.png
    1. Click Next Step.

    2. On the Portal Display page, select Display in Portal.

    3. Click Save and Finish.

    4. Click Publish Changes.

      jaink9_6-1639523283040.png

 

Configure SAML in Firehydrant

Perform these steps to configure Firehydrant as an SSO Agent SAML SP to RSA Cloud Authentication Service.

Procedure

  1. Log onto your Firehydrant account using administrative credentials.

  2. Navigate to Organization > Single sign on.

    jaink9_7-1639523351930.png
  3. On the Single Sign On page, click the checkbox Enable SSO. Additional fields will appear.

  4. Enter the following URL values:

    jaink9_8-1639523384160.png
    1. In the Idp Login URL, enter the Identity Provider URL from Step 4 of Configure RSA Cloud Authentication Service section.

    2. In the IdP Issuer, enter the Issuer Entity ID fetched from Step 4 of Configure RSA Cloud Authentication Service section.

  5. In the IdP X509 Certificate text area, enter the certificate text of the RSA certificate downloaded in Step 4 of Configure RSA Cloud Authentication Service section.

    jaink9_9-1639523407781.png
  6. In the Domains section, click Add domain and enter your email domain. This is the email domain with which the user will login to Firehydrant via SAML.

    jaink9_10-1639523436224.png
  7. Click Save.

 

Configuration is complete.

Return to the main page for more certification related information.