Relying Party Configuration - Illumio SecurID Access Implementation Guide
This section contains instructions on how to integrate SecurID Access with Illumio using Relying Party. Relying party uses SAML 2.0 to integrate SecurID Access as a SAML Identity Provider (IdP) to Illumio SAML Service Provider (SP).
Architecture Diagram
SecurID Cloud Authentication Service
Follow the steps in this section to configure SecurID Cloud Authentication Service as a Relying Party SAML IdP to Illumio .
Procedure
1. Logon to the Cloud Administrative Console and browse to Authentication Clients > Relying Parties and click Add a Relying Party.
3. Click the Add a Relying Party button on the My Relying Parties page.
4. From the Relying Party Catalog select the +Add button for Service Provider SAML.
5. Enter a name for the Service Provider in the Name field on the Basic Information page.
6. Click the Next Step button.
7. On the Authentication page, select RSA SecurID Access manages all authentication.
8. From the Primary Authentication Method pulldown, select your desired login method either Password or SecurID.
9. From the Access Policy pulldown select a policy that was previously configured.
10. Select Next Step.
11. Select Enter Manually.
12. Enter the Assertion Consumer Service (ACS) URL found on the Illumio’s Single Sign-On Configuration page.
13. Enter the Illumio Issuer in the Audience (Service Provider Entity ID) field.
14. Under IdP Signs select Entire SAML response.
15. Select Download Certificate.
16. Select Show Advanced Configuration. Under Attribute Extension add attributes Email Address, User.FirstName, User.LastName, and UserMemberOf.
17. Select Save and Finish.
18. On the My Relying Parties page, select the Edit pulldown and select View or Download IdP Metadata.
19. View the metadata file to find the Cloud Identity Provider Entity ID . Location=https://<company_IDP_Instance>.securid.com/saml-fe/sso. This is the Cloud IDP URL.
20. Navigate to Users > Identity Sources.
Note: Perform the following steps to all Identity Sources used in the policy.
21. Select Edit for the Identity Source used in the Policy.
22. On the User Attributes page, verify that the Synchronize the selected policy attributes with the Cloud Authentication Service is checked.
23. In the Policies column verify that attribute mail, sn, givenName, and memberOf are checked.
24. Click Next Step.
25. Click Save and Finish.
26. On the top menu click Publish Changes.
Illumio
Follow the steps in this section to configure Illumio as a Relying Party SAML SP to SecurID Cloud Authentication Service.
Procedure
-
Login into the Illumio administration console.
-
Navigate to Access Management > Authentication.
-
Select SAML then click Configure.
-
Click Edit.
-
Paste the Cloud certificate in the SAML Identity Provider Certificate field.
-
Enter the Cloud IDP URL in the Remote Login URL field.
-
Enter a Logout Landing URL (optional).
-
In the Authentication Method select Password Protected Transport.
-
Click Save.
Configuration is complete.
Return to the main page for more certification related information.
Related Articles
Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 502Number of Views Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 243Number of Views Okta - SAML Relying Party Configuration - RSA Ready Implementation Guide 45Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views Microsoft Entra ID Custom Controls - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 188Number of Views
Trending Articles
Downloading RSA Authentication Manager license files or RSA Software token seed records Unable to login to RSA Authentication Manager Security Console as super admin RSA Authentication Manager 8.9 Release Notes (January 2026) How to manipulate imported RSA SecurID Software Token(s) on an iPhone or iPad device Connection fails to Cloud Authentication Service when connecting through a proxy server from RSA Authentication Manager to…