Pega Platform - Relying Party Configuration - RSA Ready SecurID Access Implementation Guide
2 years ago
Originally Published: 2021-12-01

This section describes how to integrate RSA SecurID Access with Pega Platform using relying party. Relying party uses SAML 2.0 to integrate RSA SecurID Access as a SAML Identity Provider (IdP) to Pega Platform SAML Service Provider (SP).

Architecture Diagram

jaink9_0-1638357894849.png

 

Configure RSA Cloud Authentication Service

Perform these steps to configure RSA Cloud Authentication Service as a relying party SAML IdP to Pega Platform .

Procedure

    1. Sign into the RSA Cloud Administration Console and browse to Authentication Clients > Relying Parties and click Add a Relying Party.

                  jaink9_1-1638357992793.png

 

    1. Click the Add a Relying Party button on the My Relying Parties page.

                jaink9_2-1638358025149.png

 

    1. From the Relying Party Catalog select the +Add button for Service Provider SAML.

                  jaink9_3-1638358167532.png

 

    1. Enter a Name for the Service Provider in the Name field on the Basic Information page.

      jaink9_4-1638358237200.png

       

    2. Click the Next Step button.

    3. On the Authentication page, select RSA SecurID Access manages all authentication.

    4. Select your access policy from the Access Policy for Additional Authentication drop-down menu.

      jaink9_5-1638358297496.png

       

    5. Select Next Step.

    6. For Connection Profile page's Service Provider Metadata section, enter the following information:

                  jaink9_6-1638358367918.png

      1. Assertion Consumer Service (ACS) URL This can be obtained from Step 7 of Configure SAML in Pega Platform section.

      2. Service Provider Entity ID - This can also be obtained from Step 7 of Configure SAML in Pega Platform section.

    1. Select Default Service Provider Entity ID in Audience for SAML Response section.

                  jaink9_7-1638358433614.png

 

    1. Download Certificate and click Choose File and attach the .PEM file in the configuration.

      jaink9_8-1638358554759.png

       

    2. Click Show Advanced Configuration and configure User Identity with the following values:

                 jaink9_9-1638358627330.png

      1. Identity Type – Email Address

      2. Property - mail

    1. Click Save and Finish.

    2. Click Publish Changes

                  jaink9_10-1638358683820.png

  1. Navigate to Authentication Clients > Relying Parties and locate Pega in the list and from the Edit option, select View or Download IdP Metadata and Download Metadata File.

 

Configure SAML in Pega Platform

Perform these steps to configure Pega Platform as a Relying Party SAML SP to RSA Cloud Authentication Service.

Procedure

  1. Log onto the Pega Platform Dev Studio.

  2. Navigate to Configure > Org &Security > Authentication > Create Authentication Service.

    jaink9_11-1638358746960.png

     

  3. Enter the following details:

    jaink9_12-1638358797138.png

     

    • Authentication Type: SAML 2.0

    • Name: Any name for this service

    • Short description: Any short description for this service.

  4. Click Create and Open.

  5. On the Authentication Service form enter a Authentication service alias. This becomes part of the URL of SSO login.

    jaink9_13-1638358850816.png

     

  6. Click the Import IDP metadata link and select via file and choose the idp metadata downloaded in Step 15 of Configure RSA Cloud Authentication Service section.

    • After the idp metadata import the Identity Provider (IdP) information should look like this:

      jaink9_14-1638358962164.png

       

  7. On the Service Provider (SP) settings section, copy the Entity Identification url and Assertion Consumer Service (ACS) location url. These urls are needed in Step 9 of Configure RSA Cloud Authentication Service section.

    • Select Disable request signing checkbox.

      jaink9_15-1638359013299.png

       

  8. Click Save.

 

Return to the main page for more certification related information.