Federated Directory - SAML My Page SSO Configuration RSA Ready Implementation Guide
Originally Published: 2023-07-11
This section describes how to integrate Federated Directory with RSA Cloud Authentication Service using My Page SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.
Procedure
- Enable My Page SSO by accessing the RSA Cloud Administration Console > Access > My Page > Single Sign-On (SSO).
Ensure it is enabled and protected using two-factor authentication - Password and Access Policy. - On the Applications > Application Catalog page, click Create from Template.
- Select SAML Direct.
- Choose Cloud in the Basic Information section, and click Next Step.
- In the Connection Profile section, click the IDP-initiated option.
- Fill the Service Provider details in the following format:
- ACS URL: https://api.federated.directory/v2/Login/Saml2/<Directory ID>/Acs
- Service Provider Entity ID: federated.directory/<Directory ID>
- In the SAML Response Protection section, select IdP signs assertion within response.
- Select Override default signing key and certificate.
- Click Generate Cert Bundle or use your own certificates and perform the following steps:
- Select Choose File and upload the private key.
- Select Choose File to import the public signing certificate.
- Select Show Advanced Configuration, and under the User Identity section, select the Property type and Property value.
- Click Next Step.
- Choose your desired Access Policy for this application and click Next Step > Save and Finish.
- Click Publish Changes.
Configure Federated Directory
Perform these steps to configure Federated Directory.
Procedure
- Log on to your Federated Directory account.
- Navigate to Directories, then click CREATE DIRECTORY.
- Provide your new directory a name and a short description, then click CREATE DIRECTORY.
- Go to the Settings tab and copy the Id value. This value will be used in the ACS URL which will be added in RSA.
- Select the options of Federated Directory Accounts and SAML.
- Provide the value of IdP entity id generated in RSA and paste it on the Login URL.
- Paste the certificate value copied from the certificate generated (Step 9 of the previous section). Remove the begin certificate and end certificate comment before pasting.
Notes
User creation for testing requires selecting the option of Federated Directory accounts. For creating the user, perform the following steps.
- Go to the Users tab and click CREATE USER.
- Set the same password as in RSA for testing purposes.
To test the SP initiated flow, go to https://www.federated.directory/of/<your-company-name>
Configuration is complete.
Return to main page.
Related Articles
Federated Directory - SAML Relying Party Configuration RSA Ready Implementation Guide 2Number of Views Federated Directory - SAML IDR SSO Configuration RSA Ready Implementation Guide 5Number of Views Federated Directory - RSA Ready Implementation Guide 2Number of Views Error: 'Relying Party servlet: java.lang.NullPointerException' in RSA Federated Identity Manager (FIM) 30Number of Views Federated Salesforce Account Collector fails with 'Invalid Credentials' in RSA Identity Governance & Lifecycle 118Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?