ScreenSteps - SAML Relying Party Configuration - SecurID Access Implementation Guide
This section describes how to integrate SecurID Access with ScreenSteps using Relying Party. Relying party uses SAML 2.0 to integrate SecurID Access as a SAML Identity Provider (IdP) to ScreenSteps SAML Service Provider (SP).
Architecture Diagram
Configure SecurID Access Cloud Authentication Service
Perform these steps to configure SecurID Access Cloud Authentication Service (CAS) as a relying party SAML IdP to ScreenSteps .
Procedure
-
Sign into the Cloud Administration Console and browse to Authentication Clients > Relying Parties and click Add a Relying Party.
-
On Basic Information page enter a Name for the application, ie. ScreenSteps Then click on Next Step.
-
On Authentication page
-
select the RSA SecurID Access manages all authentication
-
Select the desired Primary Authentication Method from the dropdown list. i.e Password
-
Select the desired policy from the Access Policy for Additional Authentication.
-
Click Next Step
-
-
On Connection Profile page
-
Enter the Assertion Consumer Service (ACS) with the value of the SAML Consumer URL in the ScreenSteps configuration below. For example, https://rsa-ready.screenstepslive.com/saml/consume/782.
-
Enter the Service Provider Entity ID as ScreenSteps-Live .
-
Under Message Protection click on the Download Certificate. The certificate will be used in the ScreenSteps configuration below.
-
Open Advanced Configuration section and note the Identity Provider Entity ID field . For Example :https://rsa-blr-pe.auth-demo.securid.com/saml-fe/sso.
-
Click on Save and Finish.
-
-
Browse to Authentication Clients > Relying Parties
-
Click on Publish Changes. Your application is now enabled for SSO. If you make any additional changes to the application configuration you will need to republish.
Configure ScreenSteps
Perform these steps to integrate ScreenSteps with SecurID Access as a SAML SSO Agent.
Procedure
-
Sign into ScreenSteps as Admin and browse to Account .
-
Select Single Sign-On .
-
Click on Create Single Sign-on Endpoint.
-
Enter value for Title.
-
Select SAML as the Mode.
-
Enter for Remote Login URL the Identity Provider Entity ID value obtained above. For example, https://rsa-blr-pe.auth-demo.securid.com/saml-fe/sso.
-
Click on Create.
-
Note the SAML Consumer URL provided, this will be used above for SecurID Access Cloud Authentication Service configuration above.
-
Under SAML Certificate click on Upload new SAML Certificate file with the certificate downloaded above.
-
Click on Update.
-
Next Step: See main page for more certification information.
Related Articles
Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 252Number of Views Workday - SAML Relying Party Configuration - RSA Ready Implementation Guide 4Number of Views Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 519Number of Views Okta - SAML Relying Party Configuration - RSA Ready Implementation Guide 45Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Governance & Lifecycle 8.0.0 Administrators Guide RSA MFA Agent 2.5 for Microsoft Windows Installation and Administration Guide